Cezary napisał/a:

Co nadal bez zmian? Pisałem żebyś to wykonał żeby pokazać czy masz moduł załadowany, a nie że to cudowne panaceum leczące całe zło tego świata. Jeszcze nie ten etap.

wiesz co, kilka razy go zresetowalem i.... dziala.... i nawet wifi wstalo

 | Machine: Netgear R6220                                                    |
 | Uptime: 0d, 00:02:54                                                      |
 | Load: 0.19 0.26 0.11                                                      |
 | Flash: total: 14.1MB, free: 13.3MB, used: 0%                              |
 | Memory: total: 119.5MB, free: 90.9MB, used: 23%                           |
 | Leases: 1                                                                 |
 | lan: static, 192.168.1.1                                                  |
 | wan: dhcp, 192.168.68.21                                                  |
 | wan6: dhcpv6, ?                                                           |
 | vpn: none, ?                                                              |
 | radio0: lan, mode: ap, ssid: coolhat206, channel: 36, conn: 1             |
 -----------------------------------------------------------------------------
root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.100.201.254  128.0.0.0       UG    0      0        0 tun0
0.0.0.0         192.168.68.1    0.0.0.0         UG    0      0        0 wan
10.100.200.0    0.0.0.0         255.255.252.0   U     0      0        0 tun0
31.186.82.54    192.168.68.1    255.255.255.255 UGH   0      0        0 wan
128.0.0.0       10.100.201.254  128.0.0.0       UG    0      0        0 tun0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.68.0    0.0.0.0         255.255.255.0   U     0      0        0 wan
root@OpenWrt:~#

nadal bez zmian

Sat Apr  2 22:37:45 2022 daemon.notice openvpn(custom_config)[3874]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 22:37:45 2022 daemon.notice openvpn(custom_config)[3874]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 22:37:45 2022 daemon.err openvpn(custom_config)[3874]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 22:37:45 2022 daemon.notice openvpn(custom_config)[3874]: Exiting due to fatal error
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:49 2022 daemon.warn odhcpd[1864]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr  2 22:37:49 2022 daemon.err odhcpd[1864]: Failed to send to ff02::1%lan@br-lan (Address not available)
Sat Apr  2 22:37:50 2022 daemon.warn openvpn(custom_config)[3931]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 22:37:50 2022 daemon.warn openvpn(custom_config)[3931]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP_CLIENT link local: (not bound)
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=d68dfd65 7fee1387
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY KU OK
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Validating certificate extended key usage
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY EKU OK
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:52 2022 daemon.notice openvpn(custom_config)[3931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:54 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:54 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:54 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:57 2022 daemon.notice openvpn(custom_config)[3931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko

sprawdzilem w luci w zainstalowanych i jest zainstalowany kmod-tun

zaktualizowalem liste i.... widze tylko mozliwosc zainstalowania
kmod
libkmod
open-plc-utils-int6kmod

czyli zainstalowac ten pierwszy?

wlasnie probuje odpalic openvpna na innym routerze r6220 i nie mam w ogole internetu nie mowiac juz o vpnie. Wszystko zrobilem jak poprzednio (wlacznie ze skopiowaniem z poprzedniego routera dzialajacego pliku ovpn). Mozecie zerknac co jest nie tak?

 | OpenWrt 21.02-SNAPSHOT, r16201-3d62b5d5c6                                 |
 |                                                                           |
 | Build time: 2021-06-26 19:17 CEST                                         |
 | Cezary Jackiewicz, https://eko.one.pl                                     |
 |                                                                           |
 -----------------------------------------------------------------------------
 | Machine: Netgear R6220                                                    |
 | Uptime: 0d, 00:04:11                                                      |
 | Load: 0.05 0.15 0.08                                                      |
 | Flash: total: 14.7MB, free: 13.4MB, used: 3%                              |
 | Memory: total: 119.5MB, free: 97.4MB, used: 18%                           |
 | Leases: 1                                                                 |
 | lan: static, 192.168.1.1                                                  |
 | wan: dhcp, 192.168.68.21                                                  |
 | wan6: dhcpv6, ?                                                           |
 | vpn: none, ?                                                              |
 -----------------------------------------------------------------------------
root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.68.1    0.0.0.0         UG    0      0        0 wan
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.68.0    0.0.0.0         255.255.255.0   U     0      0        0 wan
root@OpenWrt:~#

a tak wyglada log

Sat Apr  2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain test
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain onion
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain localhost
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain local
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain invalid
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain bind
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain lan
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain test
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain onion
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain localhost
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain local
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain invalid
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain bind
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain lan
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using nameserver 192.168.68.1#53
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr  2 21:44:53 2022 user.notice ddns-scripts[2596]: myddns_ipv4: PID '2596' started at 2022-04-02 21:44
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: exiting on receipt of SIGTERM
Sat Apr  2 21:44:54 2022 user.warn ddns-scripts[2596]: myddns_ipv4: Service section disabled! - TERMINATE
Sat Apr  2 21:44:55 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sat Apr  2 21:44:55 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sat Apr  2 21:44:55 2022 user.warn ddns-scripts[2596]: myddns_ipv4: PID '2596' exit WITH ERROR '1' at 2022-04-02 21:44
Sat Apr  2 21:44:55 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Sat Apr  2 21:44:55 2022 daemon.notice netifd: Interface 'wan6' is now up
Sat Apr  2 21:44:56 2022 user.notice vpnbypass [3051]: service monitoring interfaces: wan
Sat Apr  2 21:44:56 2022 daemon.warn openvpn(custom_config)[2931]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:44:56 2022 daemon.warn openvpn(custom_config)[2931]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:44:56 2022 user.notice firewall: Reloading firewall due to ifup of wan6 (wan)
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=2fdbb31c 27ee83ae
Sat Apr  2 21:44:56 2022 daemon.warn odhcpd[1876]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY KU OK
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Validating certificate extended key usage
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY EKU OK
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:44:56 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led wan
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 21:44:57 2022 daemon.err ksmbd: modprobe of ksmbd module failed, can\'t start ksmbd!
Sat Apr  2 21:44:57 2022 user.notice ddns-scripts[3297]: myddns_ipv6: PID '3297' started at 2022-04-02 21:44
Sat Apr  2 21:44:57 2022 daemon.warn odhcpd[1876]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr  2 21:44:58 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:44:58 2022 user.warn ddns-scripts[3297]: myddns_ipv6: Service section disabled! - TERMINATE
Sat Apr  2 21:44:58 2022 user.warn ddns-scripts[3297]: myddns_ipv6: PID '3297' exit WITH ERROR '1' at 2022-04-02 21:44
Sat Apr  2 21:44:58 2022 daemon.err wsdd2: samba36/4 or ksmbd is not running, can't start wsdd2!
Sat Apr  2 21:44:58 2022 daemon.info procd: - init complete -
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: Connected to system UBus
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: started, version 2.85 cachesize 150
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: DNS service limited to local subnets
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: UBus support enabled: connected to system bus
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq-dhcp[3686]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain test
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain onion
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain localhost
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain local
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain invalid
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain bind
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain lan
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain test
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain onion
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain localhost
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain local
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain invalid
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain bind
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain lan
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using nameserver 192.168.68.1#53
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using nameserver fd00::de39:6fff:fea6:1732#53
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: read /etc/hosts - 4 addresses
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq-dhcp[3686]: read /etc/ethers - 0 addresses
Sat Apr  2 21:45:52 2022 user.info adblock-4.1.3[1708]: adblock is currently disabled, please set the config option 'adb_enabled' to '1' to use this service
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq[3686]: read /etc/hosts - 4 addresses
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq-dhcp[3686]: read /etc/ethers - 0 addresses
Sat Apr  2 21:45:56 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:45:56 2022 daemon.info dnsmasq-dhcp[3686]: DHCPREQUEST(br-lan) 192.168.1.119 00:26:b9:b5:ff:f6
Sat Apr  2 21:45:56 2022 daemon.info dnsmasq-dhcp[3686]: DHCPACK(br-lan) 192.168.1.119 00:26:b9:b5:ff:f6 DESKTOP-LHVRJJR
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:01 2022 daemon.err openvpn(custom_config)[2931]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Exiting due to fatal error
Sat Apr  2 21:46:06 2022 daemon.warn openvpn(custom_config)[3976]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:06 2022 daemon.warn openvpn(custom_config)[3976]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=ef6cb950 6070466f
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY KU OK
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Validating certificate extended key usage
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY EKU OK
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:07 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:13 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:16 2022 daemon.err uhttpd[2242]: luci: accepted login on /admin/status/syslog for root from 192.168.1.119
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:18 2022 daemon.err openvpn(custom_config)[3976]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Exiting due to fatal error
Sat Apr  2 21:46:23 2022 daemon.warn openvpn(custom_config)[4030]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:23 2022 daemon.warn openvpn(custom_config)[4030]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=c9c51db8 4f91e102
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY KU OK
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Validating certificate extended key usage
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY EKU OK
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:24 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:29 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:35 2022 daemon.err openvpn(custom_config)[4030]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Exiting due to fatal error
Sat Apr  2 21:46:40 2022 daemon.warn openvpn(custom_config)[4031]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:40 2022 daemon.warn openvpn(custom_config)[4031]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=81c34d95 dec6b617
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY KU OK
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Validating certificate extended key usage
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY EKU OK
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:41 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:46 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:51 2022 daemon.err openvpn(custom_config)[4031]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Exiting due to fatal error
Sat Apr  2 21:46:56 2022 daemon.warn openvpn(custom_config)[4032]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:56 2022 daemon.warn openvpn(custom_config)[4032]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=da4a591e 36c78dc7
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY KU OK
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: Validating certificate extended key usage
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY EKU OK
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:58 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:03 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:47:08 2022 daemon.err openvpn(custom_config)[4032]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Exiting due to fatal error
Sat Apr  2 21:47:13 2022 daemon.warn openvpn(custom_config)[4033]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:47:13 2022 daemon.warn openvpn(custom_config)[4033]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=914e7942 aa3a385f
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY KU OK
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: Validating certificate extended key usage
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY EKU OK
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:15 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:20 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:47:25 2022 daemon.err openvpn(custom_config)[4033]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Exiting due to fatal error
Sat Apr  2 21:47:30 2022 daemon.warn openvpn(custom_config)[4042]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:47:30 2022 daemon.warn openvpn(custom_config)[4042]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=7ae47e05 3c182ef7
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY KU OK
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: Validating certificate extended key usage
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY EKU OK
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:32 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:37 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:47:42 2022 daemon.err openvpn(custom_config)[4042]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Exiting due to fatal error
Sat Apr  2 21:47:47 2022 daemon.warn openvpn(custom_config)[4051]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:47:47 2022 daemon.warn openvpn(custom_config)[4051]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=be6d2f04 b01d4d65
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY KU OK
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Validating certificate extended key usage
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY EKU OK
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:48 2022 daemon.notice openvpn(custom_config)[4051]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Cezary napisał/a:

A bo ty masz dhcp. To jeszcze

uci set network.lan.proto='static'
uci set network.lan.netmask='255.255.255.0'
uci set network.lan.ipaddr='192.168.1.1'
uci commit
reboot

dziala, dzieki wielkie za pomoc. Wysylam na kawke $.
Teraz speedtesty i whatismyip pokazuja wlasciwa lokalizacje z Polski.  Ale widze jeden maly problem.
Wczoraj, gdy bylem podlaczony przez lan oraz gdy speedtesty nie pokazywaly wlasciwej lokalizacji to wyciagalem na speedtescie 50Mbps a dzisiaj ledwo 15Mbps.... ktos ma jakis pomysl dlaczego tak sie dzieje?

Cezary napisał/a:

Lub przywróć ustawienia domyślnie na router - będzie i szybciej i prościej.

a jaka jest komenda z konsoli na przywracanie ustawien fabrycznych?

Cezary napisał/a:

uci set network.lan.ipaddr=192.168.1.1
     uci del network.lan.gateway

 | Machine: Xiaomi Mi Router 3G                                              |
 | Uptime: 0d, 00:05:51                                                      |
 | Load: 0.05 0.07 0.03                                                      |
 | Flash: total: 95.5MB, free: 90.6MB, used: 0%                              |
 | Memory: total: 247.7MB, free: 213.2MB, used: 13%                          |
 | Leases: 0                                                                 |
 | lan: dhcp, 192.168.68.3                                                   |
 | wan: dhcp, ?                                                              |
 | wan6: dhcpv6, ?                                                           |
 | vpn: none, ?                                                              |
 | radio0: lan, mode: ap, ssid: vpn24ghz, channel: auto, conn: 1             |
 -----------------------------------------------------------------------------
root@OpenWrt:~# uci set network.lan.ipaddr=192.168.1.1
root@OpenWrt:~# uci del network.lan.gateway
uci: Entry not found
root@OpenWrt:~#

takie cos wyskakuje

Cezary napisał/a:

I zmień adres na lanie na 192.168.1.1 w xiaomi, włącz na nim serwer dhcp. Tak jak działa domyślnie jako router.

masz jakis opis jak to zrobic z poziomu konsoli?

Po podlaczeniu kabla pod port wan nie otrzymuje z routera adresu ip wiec nie moge na niego wejsc ani nawet puscic pinga - obojetnie czy podepne sie przez lan czy wlan. Pewnie musze cos zmienic z ustawieniami dhcp ale co?

dopisalem te 2 linijki, zresetowalem i tak wyglada log

Fri Apr  1 23:07:28 2022 kern.notice kernel: [    0.000000] Linux version 4.14.267 (cezary@eko.one.pl) (gcc version 7.5.0 (OpenWrt GCC 7.5.0 r11261-3f5fecfd33)) #0 SMP Thu Feb 17 18:43:38 2022
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] SoC Type: MediaTek MT7621 ver:1 eco:3
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] bootconsole [early0] enabled
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] CPU0 revision is: 0001992f (MIPS 1004Kc)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] MIPS: machine is Xiaomi Mi Router 3G
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Determined physical RAM map:
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000]  memory: 10000000 @ 00000000 (usable)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] VPE topology {2,2} total 4
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.000000] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.000000] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.000000] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Zone ranges:
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000]   Normal   [mem 0x0000000000000000-0x000000000fffffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000]   HighMem  empty
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Movable zone start for each node
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Early memory node ranges
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x000000000fffffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x000000000fffffff]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.000000] On node 0 totalpages: 65536
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.000000] free_area_init_node: node 0, pgdat 8057a860, node_mem_map 81003000
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.000000]   Normal zone: 512 pages used for memmap
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.000000]   Normal zone: 0 pages reserved
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.000000]   Normal zone: 65536 pages, LIFO batch:15
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    0.000000] random: get_random_bytes called from 0x8057c744 with crng_init=0
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] percpu: Embedded 14 pages/cpu s26224 r8192 d22928 u57344
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.000000] pcpu-alloc: s26224 r8192 d22928 u57344 alloc=14*4096
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 65024
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    0.000000] Kernel command line: console=ttyS0,115200n8 rootfstype=squashfs,jffs2
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] PID hash table entries: 1024 (order: 0, 4096 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Writing ErrCtl register=00011120
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Readback ErrCtl register=00011120
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Memory: 252396K/262144K available (4772K kernel code, 236K rwdata, 592K rodata, 1296K init, 255K bss, 9748K reserved, 0K cma-reserved, 0K highmem)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] Hierarchical RCU implementation.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] NR_IRQS: 256
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] CPU Clock: 880MHz
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] clocksource: GIC: mask: 0xffffffffffffffff max_cycles: 0xcaf478abb4, max_idle_ns: 440795247997 ns
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 4343773742 ns
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.000010] sched_clock: 32 bits at 440MHz, resolution 2ns, wraps every 4880645118ns
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.007831] Calibrating delay loop... 586.13 BogoMIPS (lpj=2930688)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.073990] pid_max: default: 32768 minimum: 301
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.078763] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.085272] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.094080] Hierarchical SRCU implementation.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.099241] smp: Bringing up secondary CPUs ...
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.104758] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.104767] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.104778] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.104916] CPU1 revision is: 0001992f (MIPS 1004Kc)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.163990] Synchronize counters for CPU 1: done.
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.198899] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.198908] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.198915] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.198987] CPU2 revision is: 0001992f (MIPS 1004Kc)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.255152] Synchronize counters for CPU 2: done.
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.285927] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.285935] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.285942] MIPS secondary cache 256kB, 8-way, linesize 32 bytes.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.286019] CPU3 revision is: 0001992f (MIPS 1004Kc)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.340336] Synchronize counters for CPU 3: done.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.370193] smp: Brought up 1 node, 4 CPUs
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.378109] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.387905] futex hash table entries: 1024 (order: 3, 32768 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.394192] pinctrl core: initialized pinctrl subsystem
Fri Apr  1 23:07:28 2022 kern.info kernel: [    0.400904] NET: Registered protocol family 16
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    0.411719] FPU Affinity set after 11720 emulations
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.412445] pull PCIe RST: RALINK_RSTCTRL = 4000000
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.717685] release PCIe RST: RALINK_RSTCTRL = 7000000
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.722731] ***** Xtal 40MHz *****
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.726090] release PCIe RST: RALINK_RSTCTRL = 7000000
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.731189] Port 0 N_FTS = 1b105000
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.734663] Port 1 N_FTS = 1b105000
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    0.738097] Port 2 N_FTS = 1b102800
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    1.893419] PCIE2 no card, disable it(RST&CLK)
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    1.897786]  -> 21007f2
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    1.900184] PCIE0 enabled
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    1.902778] PCIE1 enabled
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.905380] PCI host bridge /pcie@1e140000 ranges:
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.910160]  MEM 0x0000000060000000..0x000000006fffffff
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.915315]   IO 0x000000001e160000..0x000000001e16ffff
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    1.920511] PCI coherence region base: 0xbfbf8000, mask/settings: 0x60000000
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.937029] mt7621_gpio 1e000600.gpio: registering 32 gpios
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.942879] mt7621_gpio 1e000600.gpio: registering 32 gpios
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.948592] mt7621_gpio 1e000600.gpio: registering 32 gpios
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.956233] PCI host bridge to bus 0000:00
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.960261] pci_bus 0000:00: root bus resource [mem 0x60000000-0x6fffffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.967103] pci_bus 0000:00: root bus resource [io  0x1e160000-0x1e16ffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.973901] pci_bus 0000:00: root bus resource [??? 0x00000000 flags 0x0]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.980654] pci_bus 0000:00: No busn resource found for root bus, will use [bus 00-ff]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988549] pci 0000:00:00.0: [0e8d:0801] type 01 class 0x060400
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988590] pci 0000:00:00.0: reg 0x10: [mem 0x00000000-0x7fffffff]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988603] pci 0000:00:00.0: reg 0x14: [mem 0x60300000-0x6030ffff]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988670] pci 0000:00:00.0: supports D1
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988679] pci 0000:00:00.0: PME# supported from D0 D1 D3hot
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988927] pci 0000:00:01.0: [0e8d:0801] type 01 class 0x060400
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988956] pci 0000:00:01.0: reg 0x10: [mem 0x00000000-0x7fffffff]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.988970] pci 0000:00:01.0: reg 0x14: [mem 0x60310000-0x6031ffff]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.989022] pci 0000:00:01.0: supports D1
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.989031] pci 0000:00:01.0: PME# supported from D0 D1 D3hot
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.989443] pci 0000:01:00.0: [14c3:7603] type 00 class 0x028000
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.989485] pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x000fffff]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.989611] pci 0000:01:00.0: PME# supported from D0 D3hot D3cold
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.989788] pci_bus 0000:01: busn_res: [bus 01-ff] end is updated to 01
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.989971] pci 0000:02:00.0: [14c3:7662] type 00 class 0x028000
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.990025] pci 0000:02:00.0: reg 0x10: [mem 0x00000000-0x000fffff 64bit]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.990070] pci 0000:02:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref]
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.990163] pci 0000:02:00.0: PME# supported from D0 D3hot D3cold
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.990354] pci_bus 0000:02: busn_res: [bus 02-ff] end is updated to 02
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    1.990371] pci_bus 0000:00: busn_res: [bus 00-ff] end is updated to 02
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.990433] pci 0000:00:00.0: BAR 0: no space for [mem size 0x80000000]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    1.996971] pci 0000:00:00.0: BAR 0: failed to assign [mem size 0x80000000]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.003866] pci 0000:00:01.0: BAR 0: no space for [mem size 0x80000000]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.010438] pci 0000:00:01.0: BAR 0: failed to assign [mem size 0x80000000]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.017339] pci 0000:00:00.0: BAR 8: assigned [mem 0x60000000-0x600fffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.024096] pci 0000:00:01.0: BAR 8: assigned [mem 0x60100000-0x601fffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.030813] pci 0000:00:01.0: BAR 9: assigned [mem 0x60200000-0x602fffff pref]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.038005] pci 0000:00:00.0: BAR 1: assigned [mem 0x60300000-0x6030ffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.044738] pci 0000:00:01.0: BAR 1: assigned [mem 0x60310000-0x6031ffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.051492] pci 0000:01:00.0: BAR 0: assigned [mem 0x60000000-0x600fffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.058208] pci 0000:00:00.0: PCI bridge to [bus 01]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.063145] pci 0000:00:00.0:   bridge window [mem 0x60000000-0x600fffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.069881] pci 0000:02:00.0: BAR 0: assigned [mem 0x60100000-0x601fffff 64bit]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.077152] pci 0000:02:00.0: BAR 6: assigned [mem 0x60200000-0x6020ffff pref]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.084298] pci 0000:00:01.0: PCI bridge to [bus 02]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.089239] pci 0000:00:01.0:   bridge window [mem 0x60100000-0x601fffff]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.095961] pci 0000:00:01.0:   bridge window [mem 0x60200000-0x602fffff pref]
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.104467] clocksource: Switched to clocksource GIC
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.110947] NET: Registered protocol family 2
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.115472] IP idents hash table entries: 4096 (order: 3, 32768 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.122649] TCP established hash table entries: 2048 (order: 1, 8192 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.129567] TCP bind hash table entries: 2048 (order: 2, 16384 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.135953] TCP: Hash tables configured (established 2048 bind 2048)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.142366] UDP hash table entries: 256 (order: 1, 8192 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.148152] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.154582] NET: Registered protocol family 1
Fri Apr  1 23:07:28 2022 kern.debug kernel: [    2.158909] PCI: CLS 0 bytes, default 32
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.394412] 4 CPUs re-calibrate udelay(lpj = 2924544)
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.400886] Crashlog allocated RAM at address 0x3f00000
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.406313] workingset: timestamp_bits=30 max_order=16 bucket_order=0
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.419996] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.425809] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.437338] random: fast init done
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.442428] io scheduler noop registered
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.446336] io scheduler deadline registered (default)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.452506] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.462435] console [ttyS0] disabled
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.466036] 1e000c00.uartlite: ttyS0 at MMIO 0x1e000c00 (irq = 19, base_baud = 3125000) is a 16550A
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.475025] console [ttyS0] enabled
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.481878] bootconsole [early0] disabled
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.492143] MediaTek Nand driver init, version v2.1 Fix AHB virt2phys error
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.499335] Enable NFI Clock
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.502206] # MTK NAND # : Use HW ECC
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.505902] Device found in MTK table, ID: c8d1, EXT_ID: 809540
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.511795] Support this Device in MTK table! c8d1
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.516766] [NAND]select ecc bit:4, sparesize :64 spare_per_sector=16
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.523225] nand: device found, Manufacturer ID: 0xc8, Chip ID: 0xd1
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.529564] nand: ESMT NAND 128MiB 3,3V 8-bit
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.533900] nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
Fri Apr  1 23:07:28 2022 kern.info kernel: [    2.541472] Scanning device for bad blocks
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.689961] 10 fixed-partitions partitions found on MTD device MT7621-NAND
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.696823] Creating 10 MTD partitions on "MT7621-NAND":
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.702117] 0x000000000000-0x000000080000 : "Bootloader"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.708544] 0x000000080000-0x0000000c0000 : "Config"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.714536] 0x0000000c0000-0x000000100000 : "Bdata"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.720383] 0x000000100000-0x000000140000 : "Factory"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.726484] 0x000000140000-0x000000180000 : "crash"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.732292] 0x000000180000-0x0000001c0000 : "crash_syslog"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.738798] 0x0000001c0000-0x000000200000 : "reserved0"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.745038] 0x000000200000-0x000000600000 : "kernel_stock"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.751475] 0x000000600000-0x000000a00000 : "kernel"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    2.757509] 0x000000a00000-0x000007f80000 : "ubi"
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.764078] [mtk_nand] probe successfully!
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.768931] Signature matched and data read!
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    2.773178] load_fact_bbt success 1023
Fri Apr  1 23:07:28 2022 kern.info kernel: [    4.247532] mtk_soc_eth 1e100000.ethernet: loaded mt7530 driver
Fri Apr  1 23:07:28 2022 kern.info kernel: [    4.254245] mtk_soc_eth 1e100000.ethernet eth0: mediatek frame engine at 0xbe100000, irq 21
Fri Apr  1 23:07:28 2022 kern.info kernel: [    4.265498] NET: Registered protocol family 10
Fri Apr  1 23:07:28 2022 kern.info kernel: [    4.271535] Segment Routing with IPv6
Fri Apr  1 23:07:28 2022 kern.info kernel: [    4.275343] NET: Registered protocol family 17
Fri Apr  1 23:07:28 2022 kern.info kernel: [    4.279843] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    4.292767] 8021q: 802.1Q VLAN Support v1.8
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    4.299995] UBI: auto-attach mtd9
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    4.303331] ubi0: attaching mtd9
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.390345] ubi0: scanning is finished
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.410015] ubi0: attached mtd9 (name "ubi", size 117 MiB)
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.415521] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.422361] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.429129] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.436070] ubi0: good PEBs: 940, bad PEBs: 0, corrupted PEBs: 0
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.442047] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.449247] ubi0: max/mean erase counter: 6/2, WL threshold: 4096, image sequence number: 1280840671
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.458349] ubi0: available PEBs: 0, total reserved PEBs: 940, PEBs reserved for bad PEB handling: 20
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.467566] ubi0: background thread "ubi_bgt0d" started, PID 394
Fri Apr  1 23:07:28 2022 kern.info kernel: [    5.469564] block ubiblock0_0: created from ubi0:0(rootfs)
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    5.479043] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
Fri Apr  1 23:07:28 2022 kern.info kernel: [    5.485994] hctosys: unable to open rtc device (rtc0)
Fri Apr  1 23:07:28 2022 kern.info kernel: [    5.491277] usb_vbus: disabling
Fri Apr  1 23:07:28 2022 kern.info kernel: [    5.500964] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    5.512393] Freeing unused kernel memory: 1296K
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    5.516954] This architecture does not have kernel memory protection.
Fri Apr  1 23:07:28 2022 user.info kernel: [    6.090360] init: Console is alive
Fri Apr  1 23:07:28 2022 user.info kernel: [    6.094022] init: - watchdog -
Fri Apr  1 23:07:28 2022 kern.info kernel: [    6.214089] mtk_soc_eth 1e100000.ethernet eth0: port 2 link up
Fri Apr  1 23:07:28 2022 user.info kernel: [    7.563832] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.621193] usbcore: registered new interface driver usbfs
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.626839] usbcore: registered new interface driver hub
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.632232] usbcore: registered new device driver usb
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.661722] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    7.674402] SCSI subsystem initialized
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.681801] ehci-platform: EHCI generic platform driver
Fri Apr  1 23:07:28 2022 kern.warn kernel: [    7.693164] xhci-mtk 1e1c0000.xhci: 1e1c0000.xhci supply vusb33 not found, using dummy regulator
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.702207] xhci-mtk 1e1c0000.xhci: xHCI Host Controller
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.707593] xhci-mtk 1e1c0000.xhci: new USB bus registered, assigned bus number 1
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.724618] xhci-mtk 1e1c0000.xhci: hcc params 0x01401198 hci version 0x96 quirks 0x0000000000290010
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.733795] xhci-mtk 1e1c0000.xhci: irq 20, io mem 0x1e1c0000
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.740541] hub 1-0:1.0: USB hub found
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.744369] hub 1-0:1.0: 2 ports detected
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.748966] xhci-mtk 1e1c0000.xhci: xHCI Host Controller
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.754278] xhci-mtk 1e1c0000.xhci: new USB bus registered, assigned bus number 2
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.761765] xhci-mtk 1e1c0000.xhci: Host supports USB 3.0  SuperSpeed
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.768386] usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.777332] hub 2-0:1.0: USB hub found
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.781145] hub 2-0:1.0: 1 port detected
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.792854] usbcore: registered new interface driver usb-storage
Fri Apr  1 23:07:28 2022 kern.info kernel: [    7.800680] usbcore: registered new interface driver uas
Fri Apr  1 23:07:28 2022 user.info kernel: [    7.806409] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Fri Apr  1 23:07:28 2022 user.info kernel: [    7.814811] init: - preinit -
Fri Apr  1 23:07:28 2022 kern.info kernel: [    8.710339] mtk_soc_eth 1e100000.ethernet: PPE started
Fri Apr  1 23:07:28 2022 kern.notice kernel: [    8.785646] random: procd: uninitialized urandom read (4 bytes read)
Fri Apr  1 23:07:28 2022 user.info kernel: [   11.939782] mount_root: loading kmods from internal overlay
Fri Apr  1 23:07:28 2022 user.info kernel: [   11.978353] kmodloader: loading kernel modules from //etc/modules-boot.d/*
Fri Apr  1 23:07:28 2022 user.info kernel: [   11.989081] kmodloader: done loading kernel modules from //etc/modules-boot.d/*
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.488327] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 533
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.561501] UBIFS (ubi0:1): recovery needed
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.759955] UBIFS (ubi0:1): recovery completed
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.764542] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.772339] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.782223] UBIFS (ubi0:1): FS size: 109072384 bytes (104 MiB, 859 LEBs), journal size 5459968 bytes (5 MiB, 43 LEBs)
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.792793] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.799392] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 027FFA75-24D2-48AD-9101-483638E3BD69, small LPT model
Fri Apr  1 23:07:28 2022 user.info kernel: [   12.812744] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Fri Apr  1 23:07:28 2022 user.info kernel: [   12.829706] block: extroot: not configured
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.874695] UBIFS (ubi0:1): un-mount UBI device 0
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.879417] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" stops
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   12.891570] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 536
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   13.030551] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   13.038383] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   13.048273] UBIFS (ubi0:1): FS size: 109072384 bytes (104 MiB, 859 LEBs), journal size 5459968 bytes (5 MiB, 43 LEBs)
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   13.058844] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   13.065450] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 027FFA75-24D2-48AD-9101-483638E3BD69, small LPT model
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.083039] mount_root: loading kmods from internal overlay
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.155520] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.166818] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.544606] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.558029] block: extroot: not configured
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.597893] mount_root: switching to ubifs overlay
Fri Apr  1 23:07:28 2022 user.warn kernel: [   13.641963] urandom-seed: Seeding with /etc/urandom.seed
Fri Apr  1 23:07:28 2022 kern.info kernel: [   13.741269] mtk_soc_eth 1e100000.ethernet: 0x100 = 0x6060000c, 0x10c = 0x80818
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.760342] procd: - early -
Fri Apr  1 23:07:28 2022 user.info kernel: [   13.763323] procd: - watchdog -
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   14.406549] random: jshn: uninitialized urandom read (4 bytes read)
Fri Apr  1 23:07:28 2022 user.info kernel: [   14.504693] procd: - watchdog -
Fri Apr  1 23:07:28 2022 user.info kernel: [   14.508180] procd: - ubus -
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   14.612025] random: jshn: uninitialized urandom read (4 bytes read)
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   14.645321] random: ubusd: uninitialized urandom read (4 bytes read)
Fri Apr  1 23:07:28 2022 user.info kernel: [   14.676542] procd: - init -
Fri Apr  1 23:07:28 2022 user.info kernel: [   15.204720] kmodloader: loading kernel modules from /etc/modules.d/*
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.257582] tun: Universal TUN/TAP device driver, 1.6
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.272834] gre: GRE over IPv4 demultiplexor driver
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.282642] ip_gre: GRE over IPv4 tunneling driver
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.299359] ip6_tables: (C) 2000-2006 Netfilter Core Team
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.311349] Netfilter messages via NETLINK v0.30.
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.319208] ip_set: protocol 6
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.359103] fuse init (API version 7.26)
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.373302] usbcore: registered new interface driver cdc_acm
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.379072] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.388720] usbcore: registered new interface driver cdc_wdm
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.395869] Loading modules backported from Linux version v4.19.221-0-g5fd3cce374df
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.403507] Backport generated by backports.git v4.19.221-1-0-g07fffc43
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.413089] ip_tables: (C) 2000-2006 Netfilter Core Team
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.430704] nf_conntrack version 0.5.0 (4096 buckets, 16384 max)
Fri Apr  1 23:07:28 2022 user.info kernel: [   15.494562] urngd: v1.0.2 started.
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.553830] usbcore: registered new interface driver usblp
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.567901] usbcore: registered new interface driver usbserial
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.573913] usbcore: registered new interface driver usbserial_generic
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.580631] usbserial: USB Serial support registered for generic
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.590984] wireguard: WireGuard 1.0.20200611 loaded. See www.wireguard.com for information.
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.599436] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.624032] xt_time: kernel timezone is -0000
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.630411] usbcore: registered new interface driver cdc_ether
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.640600] usbcore: registered new interface driver cdc_ncm
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.679954] usbcore: registered new interface driver huawei_cdc_ncm
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   15.692283] random: crng init done
Fri Apr  1 23:07:28 2022 kern.notice kernel: [   15.695807] random: 6 urandom warning(s) missed due to ratelimiting
Fri Apr  1 23:07:28 2022 kern.warn kernel: [   15.740499] bus=0x1, slot = 0x0, irq=0xff
Fri Apr  1 23:07:28 2022 kern.info kernel: [   15.744884] mt7603e 0000:01:00.0: ASIC revision: 76030010
Fri Apr  1 23:07:28 2022 kern.info kernel: [   16.818636] mt7603e 0000:01:00.0: Firmware Version: ap_pcie
Fri Apr  1 23:07:28 2022 kern.info kernel: [   16.824236] mt7603e 0000:01:00.0: Build Time: 20160107100755
Fri Apr  1 23:07:28 2022 kern.info kernel: [   16.864561] mt7603e 0000:01:00.0: firmware init done
Fri Apr  1 23:07:28 2022 kern.debug kernel: [   17.037761] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Fri Apr  1 23:07:28 2022 kern.warn kernel: [   17.052616] bus=0x2, slot = 0x1, irq=0xff
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.056897] mt76x2e 0000:02:00.0: ASIC revision: 76120044
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.767688] mt76x2e 0000:02:00.0: ROM patch build: 20141115060606a
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.777376] mt76x2e 0000:02:00.0: Firmware Version: 0.0.00
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.782855] mt76x2e 0000:02:00.0: Build: 1
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.786989] mt76x2e 0000:02:00.0: Build Time: 201507311614____
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.814461] mt76x2e 0000:02:00.0: Firmware running!
Fri Apr  1 23:07:28 2022 kern.debug kernel: [   17.822312] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.833347] PPP generic driver version 2.4.2
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.839313] PPP MPPE Compression module registered
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.845589] NET: Registered protocol family 24
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.851446] PPTP driver version 0.8.5
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.858137] usbcore: registered new interface driver qmi_wwan
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.866253] usbcore: registered new interface driver rndis_host
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.875096] usbcore: registered new interface driver sierra
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.880955] usbserial: USB Serial support registered for Sierra USB modem
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.890048] usbcore: registered new interface driver sierra_net
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.900517] usbcore: registered new interface driver cdc_mbim
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.908224] usbcore: registered new interface driver option
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.913966] usbserial: USB Serial support registered for GSM modem (1-port)
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.925637] usbcore: registered new interface driver qcserial
Fri Apr  1 23:07:28 2022 kern.info kernel: [   17.931581] usbserial: USB Serial support registered for Qualcomm USB modem
Fri Apr  1 23:07:28 2022 user.info kernel: [   17.939095] kmodloader: done loading kernel modules from /etc/modules.d/*
Fri Apr  1 23:07:29 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Apr  1 23:07:29 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Apr  1 23:07:29 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 23:07:29 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: started, version 2.80 cachesize 150
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: DNS service limited to local subnets
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-nettlehash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: using local addresses only for domain test
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: using local addresses only for domain onion
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: using local addresses only for domain localhost
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: using local addresses only for domain local
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: using local addresses only for domain invalid
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: using local addresses only for domain bind
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: using local addresses only for domain lan
Fri Apr  1 23:07:29 2022 daemon.warn dnsmasq[1515]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: read /etc/hosts - 4 addresses
Fri Apr  1 23:07:29 2022 daemon.info dnsmasq[1515]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 23:07:30 2022 authpriv.info dropbear[1548]: Not backgrounding
Fri Apr  1 23:07:32 2022 user.notice : Added device handler type: 8021ad
Fri Apr  1 23:07:32 2022 user.notice : Added device handler type: 8021q
Fri Apr  1 23:07:32 2022 user.notice : Added device handler type: macvlan
Fri Apr  1 23:07:32 2022 user.notice : Added device handler type: veth
Fri Apr  1 23:07:32 2022 user.notice : Added device handler type: bridge
Fri Apr  1 23:07:32 2022 user.notice : Added device handler type: Network device
Fri Apr  1 23:07:32 2022 user.notice : Added device handler type: tunnel
Fri Apr  1 23:07:32 2022 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Fri Apr  1 23:07:32 2022 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Fri Apr  1 23:07:33 2022 daemon.info dnsmasq[1515]: exiting on receipt of SIGTERM
Fri Apr  1 23:07:33 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Apr  1 23:07:33 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Apr  1 23:07:33 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 23:07:33 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 23:07:34 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Fri Apr  1 23:07:34 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
Fri Apr  1 23:07:34 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Fri Apr  1 23:07:34 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Fri Apr  1 23:07:34 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Fri Apr  1 23:07:34 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Fri Apr  1 23:07:35 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Fri Apr  1 23:07:35 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Fri Apr  1 23:07:35 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Fri Apr  1 23:07:35 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Fri Apr  1 23:07:35 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Fri Apr  1 23:07:35 2022 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.621416] mtk_soc_eth 1e100000.ethernet: PPE started
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.632276] device eth0 entered promiscuous mode
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.638572] br-lan: port 1(eth0.1) entered blocking state
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.644020] br-lan: port 1(eth0.1) entered disabled state
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.650281] device eth0.1 entered promiscuous mode
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.660452] br-lan: port 1(eth0.1) entered blocking state
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.665967] br-lan: port 1(eth0.1) entered forwarding state
Fri Apr  1 23:07:35 2022 kern.info kernel: [   25.672076] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'lan' is enabled
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'loopback' is enabled
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'loopback' is setting up now
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'loopback' is now up
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'wan' is enabled
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'wan6' is enabled
Fri Apr  1 23:07:35 2022 daemon.notice netifd: bridge 'br-lan' link is up
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'lan' is setting up now
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Network device 'eth0' link is up
Fri Apr  1 23:07:35 2022 daemon.notice netifd: VLAN 'eth0.1' link is up
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Network device 'lo' link is up
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
Fri Apr  1 23:07:35 2022 daemon.notice netifd: VLAN 'eth0.2' link is up
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'wan' is setting up now
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Apr  1 23:07:35 2022 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Apr  1 23:07:36 2022 daemon.err odhcp6c[2119]: Failed to send RS (Address not available)
Fri Apr  1 23:07:36 2022 daemon.notice netifd: lan (2144): udhcpc: started, v1.30.1
Fri Apr  1 23:07:36 2022 daemon.notice netifd: wan (2161): udhcpc: started, v1.30.1
Fri Apr  1 23:07:36 2022 daemon.notice openvpn(custom_config)[2097]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 23:07:36 2022 daemon.notice openvpn(custom_config)[2097]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 23:07:36 2022 daemon.notice netifd: lan (2144): udhcpc: sending discover
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: started, version 2.80 cachesize 150
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: DNS service limited to local subnets
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-nettlehash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: using local addresses only for domain test
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: using local addresses only for domain onion
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: using local addresses only for domain localhost
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: using local addresses only for domain local
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: using local addresses only for domain invalid
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: using local addresses only for domain bind
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: using local addresses only for domain lan
Fri Apr  1 23:07:36 2022 daemon.warn dnsmasq[2230]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Apr  1 23:07:36 2022 daemon.notice netifd: wan (2161): udhcpc: sending discover
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: read /etc/hosts - 4 addresses
Fri Apr  1 23:07:36 2022 daemon.info dnsmasq[2230]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 23:07:36 2022 daemon.err odhcp6c[2119]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
Fri Apr  1 23:07:36 2022 kern.info kernel: [   26.685657] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Fri Apr  1 23:07:36 2022 daemon.notice netifd: lan (2144): udhcpc: performing DHCP renew
Fri Apr  1 23:07:36 2022 daemon.notice netifd: lan (2144): udhcpc: sending discover
Fri Apr  1 23:07:36 2022 daemon.notice netifd: lan (2144): udhcpc: sending select for 192.168.68.40
Fri Apr  1 23:07:36 2022 daemon.notice netifd: lan (2144): udhcpc: lease of 192.168.68.40 obtained, lease time 864000
Fri Apr  1 23:07:36 2022 user.notice vpnbypass [2225]: service monitoring interfaces: vpn
Fri Apr  1 23:07:37 2022 daemon.notice netifd: Interface 'lan' is now up
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: reading /tmp/resolv.conf.auto
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using local addresses only for domain test
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using local addresses only for domain onion
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using local addresses only for domain localhost
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using local addresses only for domain local
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using local addresses only for domain invalid
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using local addresses only for domain bind
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using local addresses only for domain lan
Fri Apr  1 23:07:37 2022 daemon.info dnsmasq[2230]: using nameserver 192.168.68.1#53
Fri Apr  1 23:07:37 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN (amber)
Fri Apr  1 23:07:37 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN1 (amber)
Fri Apr  1 23:07:37 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN2 (amber)
Fri Apr  1 23:07:37 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Fri Apr  1 23:07:37 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Fri Apr  1 23:07:37 2022 user.notice mac80211: Failed command: iw phy phy0 set antenna 0xffffffff 0xffffffff
Fri Apr  1 23:07:37 2022 daemon.notice netifd: radio0 (2062): sh: acs_survey: out of range
Fri Apr  1 23:07:38 2022 daemon.notice netifd: radio0 (2062): sh: acs_survey: out of range
Fri Apr  1 23:07:38 2022 daemon.err odhcpd[1706]: Failed to send to ff02::1%lan@br-lan (Address not available)
Fri Apr  1 23:07:38 2022 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Fri Apr  1 23:07:38 2022 kern.info kernel: [   28.516359] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Fri Apr  1 23:07:38 2022 kern.info kernel: [   28.532330] br-lan: port 2(wlan0) entered blocking state
Fri Apr  1 23:07:38 2022 kern.info kernel: [   28.538109] br-lan: port 2(wlan0) entered disabled state
Fri Apr  1 23:07:38 2022 kern.info kernel: [   28.544353] device wlan0 entered promiscuous mode
Fri Apr  1 23:07:38 2022 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Apr  1 23:07:38 2022 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Fri Apr  1 23:07:38 2022 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ACS
Fri Apr  1 23:07:38 2022 daemon.notice hostapd: wlan0: ACS-STARTED
Fri Apr  1 23:07:38 2022 daemon.notice openvpn(custom_config)[2097]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Fri Apr  1 23:07:38 2022 daemon.notice openvpn(custom_config)[2097]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Fri Apr  1 23:07:38 2022 daemon.notice openvpn(custom_config)[2097]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Fri Apr  1 23:07:39 2022 daemon.info dnsmasq[2230]: read /etc/hosts - 4 addresses
Fri Apr  1 23:07:39 2022 daemon.info dnsmasq[2230]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 23:07:39 2022 user.info adblock-4.0.7[1674]: adblock is currently disabled, please set the config option 'adb_enabled' to '1' to use this service
Fri Apr  1 23:07:39 2022 daemon.info procd: - init complete -
Fri Apr  1 23:07:39 2022 user.info wsdd2[2959]: starting.
Fri Apr  1 23:08:59 2022 daemon.notice netifd: wan (2161): udhcpc: sending discover
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: TCP connection established with [AF_INET]31.186.82.54:993
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: TCP_CLIENT link local: (not bound)
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=5b55f298 c450365c
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: VERIFY KU OK
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: Validating certificate extended key usage
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: VERIFY EKU OK
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Apr  1 23:09:00 2022 daemon.notice openvpn(custom_config)[2097]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Fri Apr  1 23:09:01 2022 daemon.notice openvpn(custom_config)[2097]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Fri Apr  1 23:09:02 2022 daemon.notice netifd: wan (2161): udhcpc: sending discover
Fri Apr  1 23:09:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 23:09:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 23:09:06 2022 daemon.notice hostapd: wlan0: ACS-COMPLETED freq=2427 channel=4
Fri Apr  1 23:09:06 2022 daemon.notice hostapd: wlan0: interface state ACS->HT_SCAN
Fri Apr  1 23:09:06 2022 daemon.notice openvpn(custom_config)[2097]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Fri Apr  1 23:09:08 2022 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=4 sec=8 based on overlapping BSSes
Fri Apr  1 23:09:08 2022 daemon.err hostapd: Using interface wlan0 with hwaddr 50:64:2b:ad:98:cd and ssid "vpn24ghz"
Fri Apr  1 23:09:08 2022 kern.info kernel: [   38.318289] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Fri Apr  1 23:09:08 2022 kern.info kernel: [   38.324984] br-lan: port 2(wlan0) entered blocking state
Fri Apr  1 23:09:08 2022 kern.info kernel: [   38.330288] br-lan: port 2(wlan0) entered forwarding state
Fri Apr  1 23:09:08 2022 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Fri Apr  1 23:09:08 2022 daemon.notice hostapd: wlan0: AP-ENABLED
Fri Apr  1 23:09:08 2022 daemon.notice netifd: Network device 'wlan0' link is up
Fri Apr  1 23:09:08 2022 daemon.notice netifd: lan (2144): udhcpc: performing DHCP renew
Fri Apr  1 23:09:08 2022 daemon.notice netifd: lan (2144): udhcpc: sending renew to 192.168.68.1
Fri Apr  1 23:09:08 2022 daemon.notice netifd: lan (2144): udhcpc: lease of 192.168.68.40 obtained, lease time 864000
Fri Apr  1 23:09:09 2022 daemon.info dnsmasq[2230]: read /etc/hosts - 4 addresses
Fri Apr  1 23:09:09 2022 daemon.info dnsmasq[2230]: read /tmp/hosts/odhcpd - 0 addresses
Fri Apr  1 23:09:09 2022 daemon.info dnsmasq[2230]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.61 255.255.252.0'
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: OPTIONS IMPORT: timers and/or timeouts modified
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: OPTIONS IMPORT: --ifconfig/up options modified
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: OPTIONS IMPORT: route-related options modified
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: TUN/TAP device tun0 opened
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: TUN/TAP TX queue length set to 100
Fri Apr  1 23:09:12 2022 daemon.notice openvpn(custom_config)[2097]: /sbin/ifconfig tun0 10.100.201.61 netmask 255.255.252.0 mtu 1500 broadcast 10.100.203.255
Fri Apr  1 23:09:12 2022 daemon.notice netifd: Interface 'vpn' is enabled
Fri Apr  1 23:09:12 2022 daemon.notice netifd: Network device 'tun0' link is up
Fri Apr  1 23:09:12 2022 daemon.notice netifd: Interface 'vpn' has link connectivity
Fri Apr  1 23:09:12 2022 daemon.notice netifd: Interface 'vpn' is setting up now
Fri Apr  1 23:09:12 2022 daemon.notice netifd: Interface 'vpn' is now up
Fri Apr  1 23:09:12 2022 user.notice firewall: Reloading firewall due to ifup of vpn (tun0)
Fri Apr  1 23:09:13 2022 user.notice vpnbypass [3244]: service monitoring interfaces: lan vpn
Fri Apr  1 23:09:14 2022 daemon.notice openvpn(custom_config)[2097]: /sbin/route add -net 31.186.82.54 netmask 255.255.255.255 gw 192.168.68.1
Fri Apr  1 23:09:14 2022 daemon.notice openvpn(custom_config)[2097]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.201.254
Fri Apr  1 23:09:14 2022 daemon.notice openvpn(custom_config)[2097]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.201.254
Fri Apr  1 23:09:14 2022 daemon.notice openvpn(custom_config)[2097]: Initialization Sequence Completed
Fri Apr  1 23:09:16 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: authenticated
Fri Apr  1 23:09:16 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: associated (aid 1)
Fri Apr  1 23:09:16 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 00:21:ff:c2:8c:2b
Fri Apr  1 23:09:16 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b WPA: pairwise key handshake completed (RSN)
Fri Apr  1 23:09:19 2022 daemon.info hostapd: wlan0: STA b0:e4:d5:e4:ab:35 IEEE 802.11: authenticated
Fri Apr  1 23:09:19 2022 daemon.info hostapd: wlan0: STA b0:e4:d5:e4:ab:35 IEEE 802.11: associated (aid 2)
Fri Apr  1 23:09:20 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED b0:e4:d5:e4:ab:35
Fri Apr  1 23:09:20 2022 daemon.info hostapd: wlan0: STA b0:e4:d5:e4:ab:35 WPA: pairwise key handshake completed (RSN)
Fri Apr  1 23:10:06 2022 daemon.info hostapd: wlan0: STA f0:7b:cb:28:71:dc IEEE 802.11: authenticated
Fri Apr  1 23:10:06 2022 daemon.info hostapd: wlan0: STA f0:7b:cb:28:71:dc IEEE 802.11: associated (aid 3)
Fri Apr  1 23:10:06 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED f0:7b:cb:28:71:dc
Fri Apr  1 23:10:06 2022 daemon.info hostapd: wlan0: STA f0:7b:cb:28:71:dc WPA: pairwise key handshake completed (RSN)
Fri Apr  1 23:11:05 2022 daemon.err uhttpd[1877]: luci: accepted login on / for root from 192.168.68.10
Fri Apr  1 23:15:51 2022 authpriv.info dropbear[3536]: Child connection from 192.168.68.10:56326
Fri Apr  1 23:15:55 2022 authpriv.notice dropbear[3536]: Password auth succeeded for 'root' from 192.168.68.10:56326
Cezary napisał/a:

Na początek ustaw na interfejsie vpn option metric 10 a na interfejsie lan option metric 20 w /etc/config/network. Zrestartuj i zobacz co będzie.

nie widze tutaj takiej linijki

config interface 'loopback'
    option ifname 'lo'
    option proto 'static'
    option ipaddr '127.0.0.1'
    option netmask '255.0.0.0'

config globals 'globals'
    option ula_prefix 'fd71:37e0:0eff::/48'

config interface 'lan'
    option type 'bridge'
    option ifname 'eth0.1'
    option proto 'dhcp'

config device 'lan_eth0_1_dev'
    option name 'eth0.1'
    option macaddr '50:64:2b:ad:98:cc'

config interface 'wan'
    option ifname 'eth0.2'
    option proto 'dhcp'

config interface 'wan6'
    option ifname 'eth0.2'
    option proto 'dhcpv6'

config switch
    option name 'switch0'
    option reset '1'
    option enable_vlan '1'

config switch_vlan
    option device 'switch0'
    option vlan '1'
    option ports '2 3 6t'

config switch_vlan
    option device 'switch0'
    option vlan '2'
    option ports '1 6t'

config interface 'wwan'
    option proto 'dhcp'

config interface 'vpn'
    option ifname 'tun0'
    option proto 'none'
Cezary napisał/a:

A to już zapytaj dostawcy vpna.

Czemu nie masz wanu tylko lecisz przez lan?

Mój Xiaomi 3G na ktorym jest openwrt jest podpiety przez lan do fritzboxa wiec chyba ma byc lan?

Co do wyswietlania mojej lokalizacji nadal jako niemcy - Support odpisał, że "trzeba jeszcze zrobic mangla, zeby wiedział jaki ruch ma iść przez vpn". Nie mam pojecia o co chodzi.... pomozesz/pomozecie?

a czemu jak wejde na whatismyip.com lub na speedtest to pokazuje ip i lokalizacje niemiecka?
What Is My IP?
My Public IP v4 is: 89.1.59.xx
My Public IP v6 is: 2001:4dd7:16c6:0:5999:5cf6:e99:xxxx
My IP Location is: Bonn, NW DE
ISP: NetCologne Gesellschaft fur Telekommunikation mbH

root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.100.201.254  128.0.0.0       UG    0      0        0 tun0
0.0.0.0         192.168.68.1    0.0.0.0         UG    0      0        0 br-lan
10.100.200.0    0.0.0.0         255.255.252.0   U     0      0        0 tun0
31.186.82.54    192.168.68.1    255.255.255.255 UGH   0      0        0 br-lan
128.0.0.0       10.100.201.254  128.0.0.0       UG    0      0        0 tun0
192.168.68.0    0.0.0.0         255.255.255.0   U     0      0        0 br-lan
root@OpenWrt:~#
Fri Apr  1 21:15:06 2022 daemon.info procd: - init complete -
Fri Apr  1 21:15:06 2022 daemon.notice netifd: wan (2119): udhcpc: sending discover
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: TCP connection established with [AF_INET]31.186.82.54:993
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: TCP_CLIENT link local: (not bound)
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: Server poll timeout, restarting
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: SIGUSR1[soft,server_poll] received, process restarting
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Fri Apr  1 21:15:07 2022 daemon.notice openvpn(custom_config)[2141]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:07 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: TCP connection established with [AF_INET]31.186.82.54:993
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: TCP_CLIENT link local: (not bound)
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=57f836d5 f5ba13df
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: VERIFY KU OK
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: Validating certificate extended key usage
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: VERIFY EKU OK
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Apr  1 21:15:08 2022 daemon.notice openvpn(custom_config)[2141]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Fri Apr  1 21:15:08 2022 daemon.info dnsmasq[2247]: read /etc/hosts - 4 addresses
Fri Apr  1 21:15:08 2022 daemon.info dnsmasq[2247]: read /tmp/hosts/odhcpd - 0 addresses
Fri Apr  1 21:15:08 2022 daemon.info dnsmasq[2247]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 21:15:09 2022 daemon.notice openvpn(custom_config)[2141]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Fri Apr  1 21:15:09 2022 daemon.notice netifd: wan (2119): udhcpc: sending discover
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: wlan0: ACS-COMPLETED freq=2427 channel=4
Fri Apr  1 21:15:13 2022 daemon.notice hostapd: wlan0: interface state ACS->HT_SCAN
Fri Apr  1 21:15:14 2022 daemon.notice openvpn(custom_config)[2141]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Fri Apr  1 21:15:15 2022 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=4 sec=8 based on overlapping BSSes
Fri Apr  1 21:15:15 2022 daemon.err hostapd: Using interface wlan0 with hwaddr 50:64:2b:ad:98:cd and ssid "vpn24ghz"
Fri Apr  1 21:15:15 2022 kern.info kernel: [   38.297362] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Fri Apr  1 21:15:15 2022 kern.info kernel: [   38.304043] br-lan: port 2(wlan0) entered blocking state
Fri Apr  1 21:15:15 2022 kern.info kernel: [   38.309342] br-lan: port 2(wlan0) entered forwarding state
Fri Apr  1 21:15:15 2022 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Fri Apr  1 21:15:15 2022 daemon.notice hostapd: wlan0: AP-ENABLED
Fri Apr  1 21:15:15 2022 daemon.notice netifd: Network device 'wlan0' link is up
Fri Apr  1 21:15:15 2022 daemon.notice netifd: lan (2097): udhcpc: performing DHCP renew
Fri Apr  1 21:15:15 2022 daemon.notice netifd: lan (2097): udhcpc: sending renew to 192.168.68.1
Fri Apr  1 21:15:15 2022 daemon.notice netifd: lan (2097): udhcpc: lease of 192.168.68.40 obtained, lease time 864000
Fri Apr  1 21:15:19 2022 daemon.err uhttpd[1875]: luci: accepted login on / for root from 192.168.68.10
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.61 255.255.252.0'
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: OPTIONS IMPORT: timers and/or timeouts modified
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: OPTIONS IMPORT: --ifconfig/up options modified
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: OPTIONS IMPORT: route-related options modified
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: TUN/TAP device tun0 opened
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: TUN/TAP TX queue length set to 100
Fri Apr  1 21:15:20 2022 daemon.notice openvpn(custom_config)[2141]: /sbin/ifconfig tun0 10.100.201.61 netmask 255.255.252.0 mtu 1500 broadcast 10.100.203.255
Fri Apr  1 21:15:20 2022 daemon.notice netifd: Interface 'vpn' is enabled
Fri Apr  1 21:15:20 2022 daemon.notice netifd: Network device 'tun0' link is up
Fri Apr  1 21:15:20 2022 daemon.notice netifd: Interface 'vpn' has link connectivity
Fri Apr  1 21:15:20 2022 daemon.notice netifd: Interface 'vpn' is setting up now
Fri Apr  1 21:15:20 2022 daemon.notice netifd: Interface 'vpn' is now up
Fri Apr  1 21:15:20 2022 user.notice firewall: Reloading firewall due to ifup of vpn (tun0)
Fri Apr  1 21:15:21 2022 user.notice vpnbypass [3275]: service monitoring interfaces: lan vpn
Fri Apr  1 21:15:22 2022 daemon.notice openvpn(custom_config)[2141]: /sbin/route add -net 31.186.82.54 netmask 255.255.255.255 gw 192.168.68.1
Fri Apr  1 21:15:22 2022 daemon.notice openvpn(custom_config)[2141]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.201.254
Fri Apr  1 21:15:22 2022 daemon.notice openvpn(custom_config)[2141]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.201.254
Fri Apr  1 21:15:22 2022 daemon.warn openvpn(custom_config)[2141]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Apr  1 21:15:22 2022 daemon.notice openvpn(custom_config)[2141]: Initialization Sequence Completed
Fri Apr  1 21:15:23 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: authenticated
Fri Apr  1 21:15:23 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: associated (aid 1)
Fri Apr  1 21:15:23 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 00:21:ff:c2:8c:2b
Fri Apr  1 21:15:23 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b WPA: pairwise key handshake completed (RSN)

nadal ip niemieckie czyli sie nie laczy sad

Cezary napisał/a:

Sam to nawet pokazałeś. Czwarta linia:
sed -i 's/dev tun.*/dev tun0/g' /etc/openvpn/Poland.11-Poznan.ovpn


ja nie mam pojecia o co w tym chodzi - po prostu wpisalem nazwe mojego pliku ovpn smile
jak ma wygladac ta linia?

dev tun0   ??

Cezary napisał/a:

dev tun jeszcze nie zmieniłeś.

przeczytalem jeszcze raz wszystkie posty i nic nie widze co mialo dotyczyc dev tun....

przeciez wszystkie zmiany sa wprowadzone - czy cos pomonalem?

root@OpenWrt:~# cat /etc/openvpn/Poland.11-Poznan.ovpn
auth-user-pass /etc/openvpn/pass.txt
client
dev tun
remote pl11.vpnonline.eu 993
proto tcp-client
remote-cert-tls server
tls-client
pull
auth SHA1
cipher AES-128-CBC
persist-key
resolv-retry infinite
reneg-sec 0
verb 3
route-delay 2
redirect-gateway def1

<ca>
-----BEGIN CERTIFICATE-----
MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM
MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D
ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU
cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3
WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg
Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw
IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH
UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM
TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU
BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM
kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x
AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV
HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV
HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y
sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL
I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8
J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY
VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI
03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw=
-----END CERTIFICATE-----
</ca>
root@OpenWrt:~#
BusyBox v1.30.1 () built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------------------------------
 |                                                                           |
 | OpenWrt 19.07-SNAPSHOT, r11407-a2482fc3a5                                 |
 |                                                                           |
 | Build time: 2022-02-19 10:11 CET                                          |
 | Cezary Jackiewicz, https://eko.one.pl                                     |
 |                                                                           |
 -----------------------------------------------------------------------------
 | Machine: Xiaomi Mi Router 3G                                              |
 | Uptime: 0d, 00:08:51                                                      |
 | Load: 0.08 0.15 0.09                                                      |
 | Flash: total: 95.5MB, free: 90.6MB, used: 0%                              |
 | Memory: total: 247.7MB, free: 212.2MB, used: 14%                          |
 | Leases: 0                                                                 |
 | lan: dhcp, 192.168.68.40                                                  |
 | wan: dhcp, ?                                                              |
 | wan6: dhcpv6, ?                                                           |
 | wwan: dhcp, ?                                                             |
 | vpn: none, ?                                                              |
 | radio0: lan, mode: ap, ssid: vpn24ghz, channel: auto, conn: 1             |
 -----------------------------------------------------------------------------
root@OpenWrt:~# uci show openvpn
openvpn.custom_config=openvpn
openvpn.custom_config.enabled='1'
openvpn.custom_config.config='/etc/openvpn/Poland.11-Poznan.ovpn'
openvpn.sample_server=openvpn
openvpn.sample_server.port='1194'
openvpn.sample_server.proto='udp'
openvpn.sample_server.dev='tun'
openvpn.sample_server.ca='/etc/openvpn/ca.crt'
openvpn.sample_server.cert='/etc/openvpn/server.crt'
openvpn.sample_server.key='/etc/openvpn/server.key'
openvpn.sample_server.dh='/etc/openvpn/dh1024.pem'
openvpn.sample_server.server='10.8.0.0 255.255.255.0'
openvpn.sample_server.ifconfig_pool_persist='/tmp/ipp.txt'
openvpn.sample_server.keepalive='10 120'
openvpn.sample_server.compress='lzo'
openvpn.sample_server.persist_key='1'
openvpn.sample_server.persist_tun='1'
openvpn.sample_server.user='nobody'
openvpn.sample_server.status='/tmp/openvpn-status.log'
openvpn.sample_server.verb='3'
openvpn.sample_client=openvpn
openvpn.sample_client.client='1'
openvpn.sample_client.dev='tun'
openvpn.sample_client.proto='udp'
openvpn.sample_client.remote='my_server_1 1194'
openvpn.sample_client.resolv_retry='infinite'
openvpn.sample_client.nobind='1'
openvpn.sample_client.persist_key='1'
openvpn.sample_client.persist_tun='1'
openvpn.sample_client.user='nobody'
openvpn.sample_client.ca='/etc/openvpn/ca.crt'
openvpn.sample_client.cert='/etc/openvpn/client.crt'
openvpn.sample_client.key='/etc/openvpn/client.key'
openvpn.sample_client.compress='lzo'
openvpn.sample_client.verb='3'
root@OpenWrt:~# cat /etc/openvpn/Poland.11-Poznan.ovpn
auth-user-pass
client
dev tun
remote pl11.vpnonline.eu 993
proto tcp-client
remote-cert-tls server
tls-client
pull
auth SHA1
cipher AES-128-CBC
persist-key
resolv-retry infinite
reneg-sec 0
verb 3
route-delay 2
redirect-gateway def1

<ca>
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
</ca>
root@OpenWrt:~#
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.487512] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 532
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.560814] UBIFS (ubi0:1): recovery needed
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.738822] UBIFS (ubi0:1): recovery completed
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.743377] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.751187] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.761071] UBIFS (ubi0:1): FS size: 109072384 bytes (104 MiB, 859 LEBs), journal size 5459968 bytes (5 MiB, 43 LEBs)
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.771641] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.778240] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 027FFA75-24D2-48AD-9101-483638E3BD69, small LPT model
Fri Apr  1 20:09:31 2022 user.info kernel: [   12.791592] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Fri Apr  1 20:09:31 2022 user.info kernel: [   12.808545] block: extroot: not configured
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.864215] UBIFS (ubi0:1): un-mount UBI device 0
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.868928] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" stops
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   12.881041] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 535
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   13.034716] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   13.042530] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   13.052437] UBIFS (ubi0:1): FS size: 109072384 bytes (104 MiB, 859 LEBs), journal size 5459968 bytes (5 MiB, 43 LEBs)
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   13.063013] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   13.069615] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 027FFA75-24D2-48AD-9101-483638E3BD69, small LPT model
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.087269] mount_root: loading kmods from internal overlay
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.159521] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.170686] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.548012] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.561397] block: extroot: not configured
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.607395] mount_root: switching to ubifs overlay
Fri Apr  1 20:09:31 2022 user.warn kernel: [   13.651362] urandom-seed: Seeding with /etc/urandom.seed
Fri Apr  1 20:09:31 2022 kern.info kernel: [   13.750351] mtk_soc_eth 1e100000.ethernet: 0x100 = 0x6060000c, 0x10c = 0x80818
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.769292] procd: - early -
Fri Apr  1 20:09:31 2022 user.info kernel: [   13.772274] procd: - watchdog -
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   14.375640] random: jshn: uninitialized urandom read (4 bytes read)
Fri Apr  1 20:09:31 2022 user.info kernel: [   14.474215] procd: - watchdog -
Fri Apr  1 20:09:31 2022 user.info kernel: [   14.477780] procd: - ubus -
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   14.581973] random: jshn: uninitialized urandom read (4 bytes read)
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   14.617633] random: ubusd: uninitialized urandom read (4 bytes read)
Fri Apr  1 20:09:31 2022 user.info kernel: [   14.636246] procd: - init -
Fri Apr  1 20:09:31 2022 user.info kernel: [   15.166730] kmodloader: loading kernel modules from /etc/modules.d/*
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.221028] tun: Universal TUN/TAP device driver, 1.6
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.236516] gre: GRE over IPv4 demultiplexor driver
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.246402] ip_gre: GRE over IPv4 tunneling driver
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.262998] ip6_tables: (C) 2000-2006 Netfilter Core Team
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.275093] Netfilter messages via NETLINK v0.30.
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.282786] ip_set: protocol 6
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.320876] fuse init (API version 7.26)
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.335722] usbcore: registered new interface driver cdc_acm
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.341385] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.351515] usbcore: registered new interface driver cdc_wdm
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.359132] Loading modules backported from Linux version v4.19.221-0-g5fd3cce374df
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.366828] Backport generated by backports.git v4.19.221-1-0-g07fffc43
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.376733] ip_tables: (C) 2000-2006 Netfilter Core Team
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.399088] nf_conntrack version 0.5.0 (4096 buckets, 16384 max)
Fri Apr  1 20:09:31 2022 user.info kernel: [   15.485506] urngd: v1.0.2 started.
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.524424] usbcore: registered new interface driver usblp
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.542129] usbcore: registered new interface driver usbserial
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.548264] usbcore: registered new interface driver usbserial_generic
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.555052] usbserial: USB Serial support registered for generic
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.566534] wireguard: WireGuard 1.0.20200611 loaded. See www.wireguard.com for information.
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.574994] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.601307] xt_time: kernel timezone is -0000
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.608271] usbcore: registered new interface driver cdc_ether
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.618488] usbcore: registered new interface driver cdc_ncm
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.659400] usbcore: registered new interface driver huawei_cdc_ncm
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   15.707029] random: crng init done
Fri Apr  1 20:09:31 2022 kern.notice kernel: [   15.710452] random: 6 urandom warning(s) missed due to ratelimiting
Fri Apr  1 20:09:31 2022 kern.warn kernel: [   15.719079] bus=0x1, slot = 0x0, irq=0xff
Fri Apr  1 20:09:31 2022 kern.info kernel: [   15.723402] mt7603e 0000:01:00.0: ASIC revision: 76030010
Fri Apr  1 20:09:31 2022 kern.info kernel: [   16.809361] mt7603e 0000:01:00.0: Firmware Version: ap_pcie
Fri Apr  1 20:09:31 2022 kern.info kernel: [   16.815106] mt7603e 0000:01:00.0: Build Time: 20160107100755
Fri Apr  1 20:09:31 2022 kern.info kernel: [   16.854094] mt7603e 0000:01:00.0: firmware init done
Fri Apr  1 20:09:31 2022 kern.debug kernel: [   17.028972] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Fri Apr  1 20:09:31 2022 kern.warn kernel: [   17.043489] bus=0x2, slot = 0x1, irq=0xff
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.047810] mt76x2e 0000:02:00.0: ASIC revision: 76120044
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.767020] mt76x2e 0000:02:00.0: ROM patch build: 20141115060606a
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.776743] mt76x2e 0000:02:00.0: Firmware Version: 0.0.00
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.782224] mt76x2e 0000:02:00.0: Build: 1
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.786354] mt76x2e 0000:02:00.0: Build Time: 201507311614____
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.813969] mt76x2e 0000:02:00.0: Firmware running!
Fri Apr  1 20:09:31 2022 kern.debug kernel: [   17.821452] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.832563] PPP generic driver version 2.4.2
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.838455] PPP MPPE Compression module registered
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.844654] NET: Registered protocol family 24
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.850522] PPTP driver version 0.8.5
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.858070] usbcore: registered new interface driver qmi_wwan
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.867015] usbcore: registered new interface driver rndis_host
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.875838] usbcore: registered new interface driver sierra
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.881585] usbserial: USB Serial support registered for Sierra USB modem
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.890555] usbcore: registered new interface driver sierra_net
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.901066] usbcore: registered new interface driver cdc_mbim
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.909054] usbcore: registered new interface driver option
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.914855] usbserial: USB Serial support registered for GSM modem (1-port)
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.926146] usbcore: registered new interface driver qcserial
Fri Apr  1 20:09:31 2022 kern.info kernel: [   17.932047] usbserial: USB Serial support registered for Qualcomm USB modem
Fri Apr  1 20:09:31 2022 user.info kernel: [   17.939531] kmodloader: done loading kernel modules from /etc/modules.d/*
Fri Apr  1 20:09:32 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Apr  1 20:09:32 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Apr  1 20:09:32 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 20:09:32 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: started, version 2.80 cachesize 150
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: DNS service limited to local subnets
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-nettlehash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: using local addresses only for domain test
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: using local addresses only for domain onion
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: using local addresses only for domain localhost
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: using local addresses only for domain local
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: using local addresses only for domain invalid
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: using local addresses only for domain bind
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: using local addresses only for domain lan
Fri Apr  1 20:09:32 2022 daemon.warn dnsmasq[1514]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: read /etc/hosts - 4 addresses
Fri Apr  1 20:09:32 2022 daemon.info dnsmasq[1514]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 20:09:33 2022 authpriv.info dropbear[1547]: Not backgrounding
Fri Apr  1 20:09:35 2022 user.notice : Added device handler type: 8021ad
Fri Apr  1 20:09:35 2022 user.notice : Added device handler type: 8021q
Fri Apr  1 20:09:35 2022 user.notice : Added device handler type: macvlan
Fri Apr  1 20:09:35 2022 user.notice : Added device handler type: veth
Fri Apr  1 20:09:35 2022 user.notice : Added device handler type: bridge
Fri Apr  1 20:09:35 2022 user.notice : Added device handler type: Network device
Fri Apr  1 20:09:35 2022 user.notice : Added device handler type: tunnel
Fri Apr  1 20:09:35 2022 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Fri Apr  1 20:09:35 2022 daemon.notice procd: /etc/init.d/network: 'radio1' is disabled
Fri Apr  1 20:09:36 2022 daemon.info dnsmasq[1514]: exiting on receipt of SIGTERM
Fri Apr  1 20:09:36 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Fri Apr  1 20:09:36 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Fri Apr  1 20:09:36 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 20:09:37 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Fri Apr  1 20:09:37 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Fri Apr  1 20:09:37 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
Fri Apr  1 20:09:37 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Fri Apr  1 20:09:37 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Fri Apr  1 20:09:37 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Fri Apr  1 20:09:38 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Fri Apr  1 20:09:38 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Fri Apr  1 20:09:38 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Fri Apr  1 20:09:38 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Fri Apr  1 20:09:38 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Fri Apr  1 20:09:38 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Fri Apr  1 20:09:38 2022 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.469620] mtk_soc_eth 1e100000.ethernet: PPE started
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.479655] device eth0 entered promiscuous mode
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.485203] br-lan: port 1(eth0.1) entered blocking state
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.490643] br-lan: port 1(eth0.1) entered disabled state
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.496905] device eth0.1 entered promiscuous mode
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.507160] br-lan: port 1(eth0.1) entered blocking state
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.512608] br-lan: port 1(eth0.1) entered forwarding state
Fri Apr  1 20:09:38 2022 kern.info kernel: [   25.518830] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'lan' is enabled
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'loopback' is enabled
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'loopback' is setting up now
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'loopback' is now up
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'wan' is enabled
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'wan6' is enabled
Fri Apr  1 20:09:38 2022 daemon.notice netifd: bridge 'br-lan' link is up
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'lan' is setting up now
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Network device 'eth0' link is up
Fri Apr  1 20:09:38 2022 daemon.notice netifd: VLAN 'eth0.1' link is up
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Network device 'lo' link is up
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
Fri Apr  1 20:09:38 2022 daemon.notice netifd: VLAN 'eth0.2' link is up
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'wan' has link connectivity
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'wan' is setting up now
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Apr  1 20:09:38 2022 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Apr  1 20:09:38 2022 daemon.notice netifd: wan (2122): udhcpc: started, v1.30.1
Fri Apr  1 20:09:39 2022 daemon.notice netifd: lan (2117): udhcpc: started, v1.30.1
Fri Apr  1 20:09:39 2022 daemon.err odhcp6c[2123]: Failed to send RS (Address not available)
Fri Apr  1 20:09:39 2022 daemon.notice netifd: wan (2122): udhcpc: sending discover
Fri Apr  1 20:09:39 2022 daemon.notice netifd: lan (2117): udhcpc: sending discover
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: started, version 2.80 cachesize 150
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: DNS service limited to local subnets
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-nettlehash no-DNSSEC no-ID loop-detect inotify dumpfile
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: using local addresses only for domain test
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: using local addresses only for domain onion
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: using local addresses only for domain localhost
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: using local addresses only for domain local
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: using local addresses only for domain invalid
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: using local addresses only for domain bind
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: using local addresses only for domain lan
Fri Apr  1 20:09:39 2022 daemon.warn dnsmasq[2199]: no servers found in /tmp/resolv.conf.auto, will retry
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: read /etc/hosts - 4 addresses
Fri Apr  1 20:09:39 2022 daemon.info dnsmasq[2199]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 20:09:39 2022 daemon.notice netifd: lan (2117): udhcpc: performing DHCP renew
Fri Apr  1 20:09:39 2022 daemon.notice netifd: lan (2117): udhcpc: sending discover
Fri Apr  1 20:09:39 2022 daemon.notice openvpn(custom_config)[2205]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:09:39 2022 daemon.notice openvpn(custom_config)[2205]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:09:39 2022 daemon.err openvpn(custom_config)[2205]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:09:39 2022 daemon.notice openvpn(custom_config)[2205]: Exiting due to fatal error
Fri Apr  1 20:09:39 2022 kern.info kernel: [   26.525614] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Fri Apr  1 20:09:39 2022 daemon.notice netifd: lan (2117): udhcpc: sending select for 192.168.68.40
Fri Apr  1 20:09:39 2022 daemon.notice netifd: lan (2117): udhcpc: lease of 192.168.68.40 obtained, lease time 864000
Fri Apr  1 20:09:40 2022 daemon.notice netifd: Interface 'lan' is now up
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: reading /tmp/resolv.conf.auto
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using local addresses only for domain test
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using local addresses only for domain onion
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using local addresses only for domain localhost
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using local addresses only for domain local
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using local addresses only for domain invalid
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using local addresses only for domain bind
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using local addresses only for domain lan
Fri Apr  1 20:09:40 2022 daemon.info dnsmasq[2199]: using nameserver 192.168.68.1#53
Fri Apr  1 20:09:40 2022 user.notice vpnbypass [2303]: service monitoring interfaces: vpn
Fri Apr  1 20:09:40 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led WAN (amber)
Fri Apr  1 20:09:40 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN1 (amber)
Fri Apr  1 20:09:40 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led LAN2 (amber)
Fri Apr  1 20:09:40 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Fri Apr  1 20:09:40 2022 user.notice mac80211: Failed command: iw phy phy0 set antenna 0xffffffff 0xffffffff
Fri Apr  1 20:09:40 2022 daemon.notice ksmbd: Starting Ksmbd userspace service.
Fri Apr  1 20:09:40 2022 daemon.notice netifd: radio0 (2041): sh: acs_survey: out of range
Fri Apr  1 20:09:40 2022 daemon.notice netifd: radio0 (2041): sh: acs_survey: out of range
Fri Apr  1 20:09:41 2022 daemon.err odhcpd[1706]: Failed to send to ff02::1%lan@br-lan (Address not available)
Fri Apr  1 20:09:41 2022 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Fri Apr  1 20:09:41 2022 kern.info kernel: [   28.297545] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Fri Apr  1 20:09:41 2022 kern.info kernel: [   28.311874] br-lan: port 2(wlan0) entered blocking state
Fri Apr  1 20:09:41 2022 kern.info kernel: [   28.317489] br-lan: port 2(wlan0) entered disabled state
Fri Apr  1 20:09:41 2022 kern.info kernel: [   28.323596] device wlan0 entered promiscuous mode
Fri Apr  1 20:09:41 2022 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Apr  1 20:09:41 2022 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Fri Apr  1 20:09:41 2022 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->ACS
Fri Apr  1 20:09:41 2022 daemon.notice hostapd: wlan0: ACS-STARTED
Fri Apr  1 20:09:42 2022 user.info adblock-4.0.7[1675]: adblock is currently disabled, please set the config option 'adb_enabled' to '1' to use this service
Fri Apr  1 20:09:42 2022 daemon.info dnsmasq[2199]: read /etc/hosts - 4 addresses
Fri Apr  1 20:09:42 2022 daemon.info dnsmasq[2199]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 20:09:42 2022 daemon.info procd: - init complete -
Fri Apr  1 20:09:42 2022 user.info wsdd2[2958]: starting.
Fri Apr  1 20:10:59 2022 daemon.notice netifd: wan (2122): udhcpc: sending discover
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:10:59 2022 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  1 20:11:01 2022 daemon.notice openvpn(custom_config)[3003]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:01 2022 daemon.notice openvpn(custom_config)[3003]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:01 2022 daemon.err openvpn(custom_config)[3003]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:01 2022 daemon.notice openvpn(custom_config)[3003]: Exiting due to fatal error
Fri Apr  1 20:11:02 2022 daemon.notice netifd: wan (2122): udhcpc: sending discover
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: ACS: Survey is missing noise floor
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: wlan0: ACS-COMPLETED freq=2427 channel=4
Fri Apr  1 20:11:06 2022 daemon.notice hostapd: wlan0: interface state ACS->HT_SCAN
Fri Apr  1 20:11:06 2022 daemon.notice openvpn(custom_config)[3005]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:06 2022 daemon.notice openvpn(custom_config)[3005]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:06 2022 daemon.err openvpn(custom_config)[3005]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:06 2022 daemon.notice openvpn(custom_config)[3005]: Exiting due to fatal error
Fri Apr  1 20:11:07 2022 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=4 sec=8 based on overlapping BSSes
Fri Apr  1 20:11:07 2022 daemon.err hostapd: Using interface wlan0 with hwaddr 50:64:2b:ad:98:cd and ssid "vpn24ghz"
Fri Apr  1 20:11:08 2022 kern.info kernel: [   38.078432] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Fri Apr  1 20:11:08 2022 kern.info kernel: [   38.085141] br-lan: port 2(wlan0) entered blocking state
Fri Apr  1 20:11:08 2022 kern.info kernel: [   38.090444] br-lan: port 2(wlan0) entered forwarding state
Fri Apr  1 20:11:08 2022 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Fri Apr  1 20:11:08 2022 daemon.notice hostapd: wlan0: AP-ENABLED
Fri Apr  1 20:11:08 2022 daemon.notice netifd: Network device 'wlan0' link is up
Fri Apr  1 20:11:08 2022 daemon.notice netifd: lan (2117): udhcpc: performing DHCP renew
Fri Apr  1 20:11:08 2022 daemon.notice netifd: lan (2117): udhcpc: sending renew to 192.168.68.1
Fri Apr  1 20:11:08 2022 daemon.notice netifd: lan (2117): udhcpc: lease of 192.168.68.40 obtained, lease time 864000
Fri Apr  1 20:11:11 2022 daemon.notice openvpn(custom_config)[3037]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:11 2022 daemon.notice openvpn(custom_config)[3037]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:11 2022 daemon.err openvpn(custom_config)[3037]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:11 2022 daemon.notice openvpn(custom_config)[3037]: Exiting due to fatal error
Fri Apr  1 20:11:15 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: authenticated
Fri Apr  1 20:11:15 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: associated (aid 1)
Fri Apr  1 20:11:15 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 00:21:ff:c2:8c:2b
Fri Apr  1 20:11:15 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b WPA: pairwise key handshake completed (RSN)
Fri Apr  1 20:11:16 2022 daemon.notice openvpn(custom_config)[3038]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:16 2022 daemon.notice openvpn(custom_config)[3038]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:16 2022 daemon.err openvpn(custom_config)[3038]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:16 2022 daemon.notice openvpn(custom_config)[3038]: Exiting due to fatal error
Fri Apr  1 20:11:21 2022 daemon.notice openvpn(custom_config)[3040]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:21 2022 daemon.notice openvpn(custom_config)[3040]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:21 2022 daemon.err openvpn(custom_config)[3040]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:21 2022 daemon.notice openvpn(custom_config)[3040]: Exiting due to fatal error
Fri Apr  1 20:11:26 2022 daemon.notice openvpn(custom_config)[3041]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:26 2022 daemon.notice openvpn(custom_config)[3041]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:26 2022 daemon.err openvpn(custom_config)[3041]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:26 2022 daemon.notice openvpn(custom_config)[3041]: Exiting due to fatal error
Fri Apr  1 20:11:31 2022 daemon.notice openvpn(custom_config)[3042]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:31 2022 daemon.notice openvpn(custom_config)[3042]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:31 2022 daemon.err openvpn(custom_config)[3042]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:31 2022 daemon.notice openvpn(custom_config)[3042]: Exiting due to fatal error
Fri Apr  1 20:11:36 2022 daemon.notice openvpn(custom_config)[3043]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:36 2022 daemon.notice openvpn(custom_config)[3043]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:36 2022 daemon.err openvpn(custom_config)[3043]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:36 2022 daemon.notice openvpn(custom_config)[3043]: Exiting due to fatal error
Fri Apr  1 20:11:41 2022 daemon.notice openvpn(custom_config)[3045]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:41 2022 daemon.notice openvpn(custom_config)[3045]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:41 2022 daemon.err openvpn(custom_config)[3045]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:41 2022 daemon.notice openvpn(custom_config)[3045]: Exiting due to fatal error
Fri Apr  1 20:11:46 2022 daemon.notice openvpn(custom_config)[3046]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:46 2022 daemon.notice openvpn(custom_config)[3046]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:46 2022 daemon.err openvpn(custom_config)[3046]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:46 2022 daemon.notice openvpn(custom_config)[3046]: Exiting due to fatal error
Fri Apr  1 20:11:51 2022 daemon.notice openvpn(custom_config)[3047]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:51 2022 daemon.notice openvpn(custom_config)[3047]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:51 2022 daemon.err openvpn(custom_config)[3047]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:51 2022 daemon.notice openvpn(custom_config)[3047]: Exiting due to fatal error
Fri Apr  1 20:11:56 2022 daemon.notice openvpn(custom_config)[3048]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:11:56 2022 daemon.notice openvpn(custom_config)[3048]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:11:56 2022 daemon.err openvpn(custom_config)[3048]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:11:56 2022 daemon.notice openvpn(custom_config)[3048]: Exiting due to fatal error
Fri Apr  1 20:12:01 2022 daemon.notice openvpn(custom_config)[3050]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:01 2022 daemon.notice openvpn(custom_config)[3050]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:01 2022 daemon.err openvpn(custom_config)[3050]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:01 2022 daemon.notice openvpn(custom_config)[3050]: Exiting due to fatal error
Fri Apr  1 20:12:06 2022 daemon.notice openvpn(custom_config)[3051]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:06 2022 daemon.notice openvpn(custom_config)[3051]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:06 2022 daemon.err openvpn(custom_config)[3051]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:06 2022 daemon.notice openvpn(custom_config)[3051]: Exiting due to fatal error
Fri Apr  1 20:12:11 2022 daemon.notice openvpn(custom_config)[3052]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:11 2022 daemon.notice openvpn(custom_config)[3052]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:11 2022 daemon.err openvpn(custom_config)[3052]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:11 2022 daemon.notice openvpn(custom_config)[3052]: Exiting due to fatal error
Fri Apr  1 20:12:16 2022 daemon.notice openvpn(custom_config)[3053]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:16 2022 daemon.notice openvpn(custom_config)[3053]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:16 2022 daemon.err openvpn(custom_config)[3053]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:16 2022 daemon.notice openvpn(custom_config)[3053]: Exiting due to fatal error
Fri Apr  1 20:12:21 2022 daemon.notice openvpn(custom_config)[3055]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:21 2022 daemon.notice openvpn(custom_config)[3055]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:21 2022 daemon.err openvpn(custom_config)[3055]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:21 2022 daemon.notice openvpn(custom_config)[3055]: Exiting due to fatal error
Fri Apr  1 20:12:26 2022 daemon.notice openvpn(custom_config)[3056]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:26 2022 daemon.notice openvpn(custom_config)[3056]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:26 2022 daemon.err openvpn(custom_config)[3056]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:26 2022 daemon.notice openvpn(custom_config)[3056]: Exiting due to fatal error
Fri Apr  1 20:12:31 2022 daemon.notice openvpn(custom_config)[3057]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:31 2022 daemon.notice openvpn(custom_config)[3057]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:31 2022 daemon.err openvpn(custom_config)[3057]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:31 2022 daemon.notice openvpn(custom_config)[3057]: Exiting due to fatal error
Fri Apr  1 20:12:36 2022 daemon.notice openvpn(custom_config)[3058]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:36 2022 daemon.notice openvpn(custom_config)[3058]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:36 2022 daemon.err openvpn(custom_config)[3058]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:36 2022 daemon.notice openvpn(custom_config)[3058]: Exiting due to fatal error
Fri Apr  1 20:12:39 2022 daemon.info dnsmasq[2199]: read /etc/hosts - 4 addresses
Fri Apr  1 20:12:39 2022 daemon.info dnsmasq[2199]: read /tmp/hosts/odhcpd - 0 addresses
Fri Apr  1 20:12:39 2022 daemon.info dnsmasq[2199]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Fri Apr  1 20:12:42 2022 daemon.notice openvpn(custom_config)[3068]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:42 2022 daemon.notice openvpn(custom_config)[3068]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:42 2022 daemon.err openvpn(custom_config)[3068]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:42 2022 daemon.notice openvpn(custom_config)[3068]: Exiting due to fatal error
Fri Apr  1 20:12:47 2022 daemon.notice openvpn(custom_config)[3069]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:47 2022 daemon.notice openvpn(custom_config)[3069]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:47 2022 daemon.err openvpn(custom_config)[3069]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:47 2022 daemon.notice openvpn(custom_config)[3069]: Exiting due to fatal error
Fri Apr  1 20:12:52 2022 daemon.notice openvpn(custom_config)[3070]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:52 2022 daemon.notice openvpn(custom_config)[3070]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:52 2022 daemon.err openvpn(custom_config)[3070]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:52 2022 daemon.notice openvpn(custom_config)[3070]: Exiting due to fatal error
Fri Apr  1 20:12:57 2022 daemon.notice openvpn(custom_config)[3071]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:12:57 2022 daemon.notice openvpn(custom_config)[3071]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:12:57 2022 daemon.err openvpn(custom_config)[3071]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:12:57 2022 daemon.notice openvpn(custom_config)[3071]: Exiting due to fatal error
Fri Apr  1 20:13:02 2022 daemon.notice openvpn(custom_config)[3073]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:02 2022 daemon.notice openvpn(custom_config)[3073]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:02 2022 daemon.err openvpn(custom_config)[3073]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:02 2022 daemon.notice openvpn(custom_config)[3073]: Exiting due to fatal error
Fri Apr  1 20:13:07 2022 daemon.notice openvpn(custom_config)[3074]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:07 2022 daemon.notice openvpn(custom_config)[3074]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:07 2022 daemon.err openvpn(custom_config)[3074]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:07 2022 daemon.notice openvpn(custom_config)[3074]: Exiting due to fatal error
Fri Apr  1 20:13:12 2022 daemon.notice openvpn(custom_config)[3075]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:12 2022 daemon.notice openvpn(custom_config)[3075]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:12 2022 daemon.err openvpn(custom_config)[3075]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:12 2022 daemon.notice openvpn(custom_config)[3075]: Exiting due to fatal error
Fri Apr  1 20:13:17 2022 daemon.notice openvpn(custom_config)[3076]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:17 2022 daemon.notice openvpn(custom_config)[3076]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:17 2022 daemon.err openvpn(custom_config)[3076]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:17 2022 daemon.notice openvpn(custom_config)[3076]: Exiting due to fatal error
Fri Apr  1 20:13:22 2022 daemon.notice openvpn(custom_config)[3078]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:22 2022 daemon.notice openvpn(custom_config)[3078]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:22 2022 daemon.err openvpn(custom_config)[3078]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:22 2022 daemon.notice openvpn(custom_config)[3078]: Exiting due to fatal error
Fri Apr  1 20:13:26 2022 daemon.err uhttpd[1878]: luci: accepted login on / for root from 192.168.68.31
Fri Apr  1 20:13:27 2022 daemon.notice openvpn(custom_config)[3081]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:27 2022 daemon.notice openvpn(custom_config)[3081]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:27 2022 daemon.err openvpn(custom_config)[3081]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:27 2022 daemon.notice openvpn(custom_config)[3081]: Exiting due to fatal error
Fri Apr  1 20:13:32 2022 daemon.notice openvpn(custom_config)[3191]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:32 2022 daemon.notice openvpn(custom_config)[3191]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:32 2022 daemon.err openvpn(custom_config)[3191]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:32 2022 daemon.notice openvpn(custom_config)[3191]: Exiting due to fatal error
Fri Apr  1 20:13:37 2022 daemon.notice openvpn(custom_config)[3200]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:37 2022 daemon.notice openvpn(custom_config)[3200]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:37 2022 daemon.err openvpn(custom_config)[3200]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:37 2022 daemon.notice openvpn(custom_config)[3200]: Exiting due to fatal error
Fri Apr  1 20:13:42 2022 daemon.notice openvpn(custom_config)[3210]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:42 2022 daemon.notice openvpn(custom_config)[3210]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:42 2022 daemon.err openvpn(custom_config)[3210]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:42 2022 daemon.notice openvpn(custom_config)[3210]: Exiting due to fatal error
Fri Apr  1 20:13:47 2022 daemon.notice openvpn(custom_config)[3219]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:47 2022 daemon.notice openvpn(custom_config)[3219]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:47 2022 daemon.err openvpn(custom_config)[3219]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:47 2022 daemon.notice openvpn(custom_config)[3219]: Exiting due to fatal error
Fri Apr  1 20:13:52 2022 daemon.notice openvpn(custom_config)[3228]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:52 2022 daemon.notice openvpn(custom_config)[3228]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:52 2022 daemon.err openvpn(custom_config)[3228]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:52 2022 daemon.notice openvpn(custom_config)[3228]: Exiting due to fatal error
Fri Apr  1 20:13:57 2022 daemon.notice openvpn(custom_config)[3237]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:13:57 2022 daemon.notice openvpn(custom_config)[3237]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:13:57 2022 daemon.err openvpn(custom_config)[3237]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:13:57 2022 daemon.notice openvpn(custom_config)[3237]: Exiting due to fatal error
Fri Apr  1 20:14:02 2022 daemon.notice openvpn(custom_config)[3249]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:02 2022 daemon.notice openvpn(custom_config)[3249]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:02 2022 daemon.err openvpn(custom_config)[3249]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:02 2022 daemon.notice openvpn(custom_config)[3249]: Exiting due to fatal error
Fri Apr  1 20:14:07 2022 daemon.notice openvpn(custom_config)[3259]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:07 2022 daemon.notice openvpn(custom_config)[3259]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:07 2022 daemon.err openvpn(custom_config)[3259]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:07 2022 daemon.notice openvpn(custom_config)[3259]: Exiting due to fatal error
Fri Apr  1 20:14:12 2022 daemon.notice openvpn(custom_config)[3268]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:12 2022 daemon.notice openvpn(custom_config)[3268]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:12 2022 daemon.err openvpn(custom_config)[3268]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:12 2022 daemon.notice openvpn(custom_config)[3268]: Exiting due to fatal error
Fri Apr  1 20:14:17 2022 daemon.notice openvpn(custom_config)[3277]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:17 2022 daemon.notice openvpn(custom_config)[3277]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:17 2022 daemon.err openvpn(custom_config)[3277]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:17 2022 daemon.notice openvpn(custom_config)[3277]: Exiting due to fatal error
Fri Apr  1 20:14:22 2022 daemon.notice openvpn(custom_config)[3286]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:22 2022 daemon.notice openvpn(custom_config)[3286]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:22 2022 daemon.err openvpn(custom_config)[3286]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:22 2022 daemon.notice openvpn(custom_config)[3286]: Exiting due to fatal error
Fri Apr  1 20:14:27 2022 daemon.notice openvpn(custom_config)[3291]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:27 2022 daemon.notice openvpn(custom_config)[3291]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:27 2022 daemon.err openvpn(custom_config)[3291]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:27 2022 daemon.notice openvpn(custom_config)[3291]: Exiting due to fatal error
Fri Apr  1 20:14:32 2022 daemon.notice openvpn(custom_config)[3293]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:32 2022 daemon.notice openvpn(custom_config)[3293]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:32 2022 daemon.err openvpn(custom_config)[3293]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:32 2022 daemon.notice openvpn(custom_config)[3293]: Exiting due to fatal error
Fri Apr  1 20:14:37 2022 daemon.notice openvpn(custom_config)[3294]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:37 2022 daemon.notice openvpn(custom_config)[3294]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:37 2022 daemon.err openvpn(custom_config)[3294]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:37 2022 daemon.notice openvpn(custom_config)[3294]: Exiting due to fatal error
Fri Apr  1 20:14:42 2022 daemon.notice openvpn(custom_config)[3300]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:42 2022 daemon.notice openvpn(custom_config)[3300]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:42 2022 daemon.err openvpn(custom_config)[3300]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:42 2022 daemon.notice openvpn(custom_config)[3300]: Exiting due to fatal error
Fri Apr  1 20:14:47 2022 daemon.notice openvpn(custom_config)[3304]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:47 2022 daemon.notice openvpn(custom_config)[3304]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:47 2022 daemon.err openvpn(custom_config)[3304]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:47 2022 daemon.notice openvpn(custom_config)[3304]: Exiting due to fatal error
Fri Apr  1 20:14:52 2022 daemon.notice openvpn(custom_config)[3310]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 20:14:52 2022 daemon.notice openvpn(custom_config)[3310]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 20:14:52 2022 daemon.err openvpn(custom_config)[3310]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 20:14:52 2022 daemon.notice openvpn(custom_config)[3310]: Exiting due to fatal error
Fri Apr  1 19:53:37 2022 daemon.notice hostapd: wlan0: AP-ENABLED
Fri Apr  1 19:53:38 2022 daemon.notice netifd: Network device 'wlan0' link is up
Fri Apr  1 19:53:38 2022 daemon.notice netifd: lan (2088): udhcpc: performing DHCP renew
Fri Apr  1 19:53:38 2022 daemon.notice netifd: lan (2088): udhcpc: sending renew to 192.168.68.1
Fri Apr  1 19:53:38 2022 daemon.notice netifd: lan (2088): udhcpc: lease of 192.168.68.40 obtained, lease time 864000
Fri Apr  1 19:53:41 2022 daemon.notice openvpn(custom_config)[3036]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:53:41 2022 daemon.notice openvpn(custom_config)[3036]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:53:41 2022 daemon.err openvpn(custom_config)[3036]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:53:41 2022 daemon.notice openvpn(custom_config)[3036]: Exiting due to fatal error
Fri Apr  1 19:53:45 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: authenticated
Fri Apr  1 19:53:45 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b IEEE 802.11: associated (aid 1)
Fri Apr  1 19:53:45 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 00:21:ff:c2:8c:2b
Fri Apr  1 19:53:45 2022 daemon.info hostapd: wlan0: STA 00:21:ff:c2:8c:2b WPA: pairwise key handshake completed (RSN)
Fri Apr  1 19:53:46 2022 daemon.notice openvpn(custom_config)[3037]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:53:46 2022 daemon.notice openvpn(custom_config)[3037]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:53:46 2022 daemon.err openvpn(custom_config)[3037]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:53:46 2022 daemon.notice openvpn(custom_config)[3037]: Exiting due to fatal error
Fri Apr  1 19:53:51 2022 daemon.notice openvpn(custom_config)[3039]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:53:51 2022 daemon.notice openvpn(custom_config)[3039]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:53:51 2022 daemon.err openvpn(custom_config)[3039]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:53:51 2022 daemon.notice openvpn(custom_config)[3039]: Exiting due to fatal error
Fri Apr  1 19:53:56 2022 daemon.notice openvpn(custom_config)[3040]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:53:56 2022 daemon.notice openvpn(custom_config)[3040]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:53:56 2022 daemon.err openvpn(custom_config)[3040]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:53:56 2022 daemon.notice openvpn(custom_config)[3040]: Exiting due to fatal error
Fri Apr  1 19:54:01 2022 daemon.notice openvpn(custom_config)[3056]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:01 2022 daemon.notice openvpn(custom_config)[3056]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:01 2022 daemon.err openvpn(custom_config)[3056]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:01 2022 daemon.notice openvpn(custom_config)[3056]: Exiting due to fatal error
Fri Apr  1 19:54:06 2022 daemon.notice openvpn(custom_config)[3083]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:06 2022 daemon.notice openvpn(custom_config)[3083]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:06 2022 daemon.err openvpn(custom_config)[3083]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:06 2022 daemon.notice openvpn(custom_config)[3083]: Exiting due to fatal error
Fri Apr  1 19:54:06 2022 daemon.info hostapd: wlan0: STA b0:e4:d5:e4:ab:35 IEEE 802.11: authenticated
Fri Apr  1 19:54:06 2022 daemon.info hostapd: wlan0: STA b0:e4:d5:e4:ab:35 IEEE 802.11: associated (aid 2)
Fri Apr  1 19:54:06 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED b0:e4:d5:e4:ab:35
Fri Apr  1 19:54:06 2022 daemon.info hostapd: wlan0: STA b0:e4:d5:e4:ab:35 WPA: pairwise key handshake completed (RSN)
Fri Apr  1 19:54:07 2022 daemon.err uhttpd[1879]: luci: accepted login on / for root from 192.168.68.31
Fri Apr  1 19:54:11 2022 daemon.notice openvpn(custom_config)[3194]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:11 2022 daemon.notice openvpn(custom_config)[3194]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:11 2022 daemon.err openvpn(custom_config)[3194]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:11 2022 daemon.notice openvpn(custom_config)[3194]: Exiting due to fatal error
Fri Apr  1 19:54:16 2022 daemon.notice openvpn(custom_config)[3204]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:16 2022 daemon.notice openvpn(custom_config)[3204]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:16 2022 daemon.err openvpn(custom_config)[3204]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:16 2022 daemon.notice openvpn(custom_config)[3204]: Exiting due to fatal error
Fri Apr  1 19:54:21 2022 daemon.notice openvpn(custom_config)[3213]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:21 2022 daemon.notice openvpn(custom_config)[3213]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:21 2022 daemon.err openvpn(custom_config)[3213]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:21 2022 daemon.notice openvpn(custom_config)[3213]: Exiting due to fatal error
Fri Apr  1 19:54:26 2022 daemon.notice openvpn(custom_config)[3223]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:26 2022 daemon.notice openvpn(custom_config)[3223]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:26 2022 daemon.err openvpn(custom_config)[3223]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:26 2022 daemon.notice openvpn(custom_config)[3223]: Exiting due to fatal error
Fri Apr  1 19:54:31 2022 daemon.notice openvpn(custom_config)[3227]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:31 2022 daemon.notice openvpn(custom_config)[3227]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:31 2022 daemon.err openvpn(custom_config)[3227]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:31 2022 daemon.notice openvpn(custom_config)[3227]: Exiting due to fatal error
Fri Apr  1 19:54:36 2022 daemon.notice openvpn(custom_config)[3234]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:54:36 2022 daemon.notice openvpn(custom_config)[3234]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:54:36 2022 daemon.err openvpn(custom_config)[3234]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:54:36 2022 daemon.notice openvpn(custom_config)[3234]: Exiting due to fatal error
Fri Apr  1 19:54:39 2022 daemon.info dnsmasq[2199]: read /etc/hosts - 4 addresses
Fri Apr  1 19:54:39 2022 daemon.info dnsmasq[2199]: read /tmp/hosts/odhcpd - 0 addresses
Fri Apr  1 19:54:39 2022 daemon.info dnsmasq[2199]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
root@OpenWrt:~# ls -al /etc/openvpn/pass.txt
-rw-r--r--    1 root     root            27 Apr  1 17:13 /etc/openvpn/pass.txt
root@OpenWrt:~#
Fri Apr  1 19:39:06 2022 daemon.notice openvpn(custom_config)[3496]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:39:06 2022 daemon.err openvpn(custom_config)[3496]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:39:06 2022 daemon.notice openvpn(custom_config)[3496]: Exiting due to fatal error
Fri Apr  1 19:39:09 2022 authpriv.info dropbear[2987]: Exit (root): Exited normally
Fri Apr  1 19:39:11 2022 daemon.notice openvpn(custom_config)[3506]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:39:11 2022 daemon.notice openvpn(custom_config)[3506]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:39:11 2022 daemon.err openvpn(custom_config)[3506]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:39:11 2022 daemon.notice openvpn(custom_config)[3506]: Exiting due to fatal error
Fri Apr  1 19:39:16 2022 daemon.notice openvpn(custom_config)[3515]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:39:16 2022 daemon.notice openvpn(custom_config)[3515]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:39:16 2022 daemon.err openvpn(custom_config)[3515]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:39:16 2022 daemon.notice openvpn(custom_config)[3515]: Exiting due to fatal error
Fri Apr  1 19:39:21 2022 daemon.notice openvpn(custom_config)[3527]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:39:21 2022 daemon.notice openvpn(custom_config)[3527]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:39:21 2022 daemon.err openvpn(custom_config)[3527]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:39:21 2022 daemon.notice openvpn(custom_config)[3527]: Exiting due to fatal error
Fri Apr  1 19:39:26 2022 daemon.notice openvpn(custom_config)[3535]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:39:26 2022 daemon.notice openvpn(custom_config)[3535]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:39:26 2022 daemon.err openvpn(custom_config)[3535]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:39:26 2022 daemon.notice openvpn(custom_config)[3535]: Exiting due to fatal error
Fri Apr  1 19:39:31 2022 daemon.notice openvpn(custom_config)[3540]: OpenVPN 2.4.11 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  1 19:39:31 2022 daemon.notice openvpn(custom_config)[3540]: library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
Fri Apr  1 19:39:31 2022 daemon.err openvpn(custom_config)[3540]: neither stdin nor stderr are a tty device and you have neither a controlling tty nor systemd - can't ask for 'Enter Auth Username:'.  If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.
Fri Apr  1 19:39:31 2022 daemon.notice openvpn(custom_config)[3540]: Exiting due to fatal error

moim zdaniem wyglada to coraz gorzej...

 | radio0: lan, mode: ap, ssid: vpn24ghz, channel: auto, conn: 2             |
 -----------------------------------------------------------------------------
root@OpenWrt:~# cat /etc/openvpn/Poland.11-Poznan.ovpn
client
dev tun0
remote pl11.vpnonline.eu 993
proto tcp-client
remote-cert-tls server
tls-client
block-outside-dns
pull
auth SHA1
cipher AES-128-CBC
persist-key
resolv-retry infinite
reneg-sec 0
verb 3
auth-nocache
route-delay 2
redirect-gateway def1

<ca>
-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
</ca>

auth-user-pass /etc/openvpn/pass.txt
root@OpenWrt:~#

tak wyglada zawartosc pliku.  niestety sam dalej nie rusze smile