251

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

Cezary napisał/a:

uci set network.lan.ipaddr=192.168.1.1
     uci del network.lan.gateway

 | Machine: Xiaomi Mi Router 3G                                              |
 | Uptime: 0d, 00:05:51                                                      |
 | Load: 0.05 0.07 0.03                                                      |
 | Flash: total: 95.5MB, free: 90.6MB, used: 0%                              |
 | Memory: total: 247.7MB, free: 213.2MB, used: 13%                          |
 | Leases: 0                                                                 |
 | lan: dhcp, 192.168.68.3                                                   |
 | wan: dhcp, ?                                                              |
 | wan6: dhcpv6, ?                                                           |
 | vpn: none, ?                                                              |
 | radio0: lan, mode: ap, ssid: vpn24ghz, channel: auto, conn: 1             |
 -----------------------------------------------------------------------------
root@OpenWrt:~# uci set network.lan.ipaddr=192.168.1.1
root@OpenWrt:~# uci del network.lan.gateway
uci: Entry not found
root@OpenWrt:~#

takie cos wyskakuje

252

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

A bo ty masz dhcp. To jeszcze

uci set network.lan.proto='static'
uci set network.lan.netmask='255.255.255.0'
uci set network.lan.ipaddr='192.168.1.1'
uci commit
reboot

Lub przywróć ustawienia domyślnie na router - będzie i szybciej i prościej.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

253

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

Cezary napisał/a:

Lub przywróć ustawienia domyślnie na router - będzie i szybciej i prościej.

a jaka jest komenda z konsoli na przywracanie ustawien fabrycznych?

254

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

firstboot

Zniknie wszystko co ustawiłeś i co zmieniłeś na routerze.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

255

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

Cezary napisał/a:

A bo ty masz dhcp. To jeszcze

uci set network.lan.proto='static'
uci set network.lan.netmask='255.255.255.0'
uci set network.lan.ipaddr='192.168.1.1'
uci commit
reboot

dziala, dzieki wielkie za pomoc. Wysylam na kawke $.
Teraz speedtesty i whatismyip pokazuja wlasciwa lokalizacje z Polski.  Ale widze jeden maly problem.
Wczoraj, gdy bylem podlaczony przez lan oraz gdy speedtesty nie pokazywaly wlasciwej lokalizacji to wyciagalem na speedtescie 50Mbps a dzisiaj ledwo 15Mbps.... ktos ma jakis pomysl dlaczego tak sie dzieje?

256

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

VPN zwalnia transfer, więc licz się z tym że będzie mniej. Czasami nawet sporo mniej. I zalezy to od pory dnia i liczby osób korzystających z sieci.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

257

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

wlasnie probuje odpalic openvpna na innym routerze r6220 i nie mam w ogole internetu nie mowiac juz o vpnie. Wszystko zrobilem jak poprzednio (wlacznie ze skopiowaniem z poprzedniego routera dzialajacego pliku ovpn). Mozecie zerknac co jest nie tak?

 | OpenWrt 21.02-SNAPSHOT, r16201-3d62b5d5c6                                 |
 |                                                                           |
 | Build time: 2021-06-26 19:17 CEST                                         |
 | Cezary Jackiewicz, https://eko.one.pl                                     |
 |                                                                           |
 -----------------------------------------------------------------------------
 | Machine: Netgear R6220                                                    |
 | Uptime: 0d, 00:04:11                                                      |
 | Load: 0.05 0.15 0.08                                                      |
 | Flash: total: 14.7MB, free: 13.4MB, used: 3%                              |
 | Memory: total: 119.5MB, free: 97.4MB, used: 18%                           |
 | Leases: 1                                                                 |
 | lan: static, 192.168.1.1                                                  |
 | wan: dhcp, 192.168.68.21                                                  |
 | wan6: dhcpv6, ?                                                           |
 | vpn: none, ?                                                              |
 -----------------------------------------------------------------------------
root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.68.1    0.0.0.0         UG    0      0        0 wan
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.68.0    0.0.0.0         255.255.255.0   U     0      0        0 wan
root@OpenWrt:~#

a tak wyglada log

Sat Apr  2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain test
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain onion
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain localhost
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain local
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain invalid
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain bind
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain lan
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain test
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain onion
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain localhost
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain local
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain invalid
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain bind
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain lan
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: using nameserver 192.168.68.1#53
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr  2 21:44:53 2022 user.notice ddns-scripts[2596]: myddns_ipv4: PID '2596' started at 2022-04-02 21:44
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr  2 21:44:54 2022 daemon.info dnsmasq[2727]: exiting on receipt of SIGTERM
Sat Apr  2 21:44:54 2022 user.warn ddns-scripts[2596]: myddns_ipv4: Service section disabled! - TERMINATE
Sat Apr  2 21:44:55 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sat Apr  2 21:44:55 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sat Apr  2 21:44:55 2022 user.warn ddns-scripts[2596]: myddns_ipv4: PID '2596' exit WITH ERROR '1' at 2022-04-02 21:44
Sat Apr  2 21:44:55 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Sat Apr  2 21:44:55 2022 daemon.notice netifd: Interface 'wan6' is now up
Sat Apr  2 21:44:56 2022 user.notice vpnbypass [3051]: service monitoring interfaces: wan
Sat Apr  2 21:44:56 2022 daemon.warn openvpn(custom_config)[2931]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:44:56 2022 daemon.warn openvpn(custom_config)[2931]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:44:56 2022 user.notice firewall: Reloading firewall due to ifup of wan6 (wan)
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=2fdbb31c 27ee83ae
Sat Apr  2 21:44:56 2022 daemon.warn odhcpd[1876]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY KU OK
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Validating certificate extended key usage
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY EKU OK
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:44:56 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led wan
Sat Apr  2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 21:44:57 2022 daemon.err ksmbd: modprobe of ksmbd module failed, can\'t start ksmbd!
Sat Apr  2 21:44:57 2022 user.notice ddns-scripts[3297]: myddns_ipv6: PID '3297' started at 2022-04-02 21:44
Sat Apr  2 21:44:57 2022 daemon.warn odhcpd[1876]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr  2 21:44:58 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:44:58 2022 user.warn ddns-scripts[3297]: myddns_ipv6: Service section disabled! - TERMINATE
Sat Apr  2 21:44:58 2022 user.warn ddns-scripts[3297]: myddns_ipv6: PID '3297' exit WITH ERROR '1' at 2022-04-02 21:44
Sat Apr  2 21:44:58 2022 daemon.err wsdd2: samba36/4 or ksmbd is not running, can't start wsdd2!
Sat Apr  2 21:44:58 2022 daemon.info procd: - init complete -
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: Connected to system UBus
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: started, version 2.85 cachesize 150
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: DNS service limited to local subnets
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: UBus support enabled: connected to system bus
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq-dhcp[3686]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain test
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain onion
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain localhost
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain local
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain invalid
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain bind
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain lan
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain test
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain onion
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain localhost
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain local
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain invalid
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain bind
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain lan
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using nameserver 192.168.68.1#53
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: using nameserver fd00::de39:6fff:fea6:1732#53
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: read /etc/hosts - 4 addresses
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:45:52 2022 daemon.info dnsmasq-dhcp[3686]: read /etc/ethers - 0 addresses
Sat Apr  2 21:45:52 2022 user.info adblock-4.1.3[1708]: adblock is currently disabled, please set the config option 'adb_enabled' to '1' to use this service
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq[3686]: read /etc/hosts - 4 addresses
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr  2 21:45:53 2022 daemon.info dnsmasq-dhcp[3686]: read /etc/ethers - 0 addresses
Sat Apr  2 21:45:56 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:45:56 2022 daemon.info dnsmasq-dhcp[3686]: DHCPREQUEST(br-lan) 192.168.1.119 00:26:b9:b5:ff:f6
Sat Apr  2 21:45:56 2022 daemon.info dnsmasq-dhcp[3686]: DHCPACK(br-lan) 192.168.1.119 00:26:b9:b5:ff:f6 DESKTOP-LHVRJJR
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:01 2022 daemon.err openvpn(custom_config)[2931]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Exiting due to fatal error
Sat Apr  2 21:46:06 2022 daemon.warn openvpn(custom_config)[3976]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:06 2022 daemon.warn openvpn(custom_config)[3976]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=ef6cb950 6070466f
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY KU OK
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Validating certificate extended key usage
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY EKU OK
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:07 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:13 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:16 2022 daemon.err uhttpd[2242]: luci: accepted login on /admin/status/syslog for root from 192.168.1.119
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:18 2022 daemon.err openvpn(custom_config)[3976]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Exiting due to fatal error
Sat Apr  2 21:46:23 2022 daemon.warn openvpn(custom_config)[4030]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:23 2022 daemon.warn openvpn(custom_config)[4030]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=c9c51db8 4f91e102
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY KU OK
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Validating certificate extended key usage
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY EKU OK
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:24 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:29 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:35 2022 daemon.err openvpn(custom_config)[4030]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Exiting due to fatal error
Sat Apr  2 21:46:40 2022 daemon.warn openvpn(custom_config)[4031]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:40 2022 daemon.warn openvpn(custom_config)[4031]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=81c34d95 dec6b617
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY KU OK
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Validating certificate extended key usage
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY EKU OK
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:41 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:46 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:46:51 2022 daemon.err openvpn(custom_config)[4031]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Exiting due to fatal error
Sat Apr  2 21:46:56 2022 daemon.warn openvpn(custom_config)[4032]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:46:56 2022 daemon.warn openvpn(custom_config)[4032]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=da4a591e 36c78dc7
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY KU OK
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: Validating certificate extended key usage
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY EKU OK
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:46:58 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:03 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:47:08 2022 daemon.err openvpn(custom_config)[4032]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Exiting due to fatal error
Sat Apr  2 21:47:13 2022 daemon.warn openvpn(custom_config)[4033]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:47:13 2022 daemon.warn openvpn(custom_config)[4033]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=914e7942 aa3a385f
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY KU OK
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: Validating certificate extended key usage
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY EKU OK
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:15 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:20 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:47:25 2022 daemon.err openvpn(custom_config)[4033]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Exiting due to fatal error
Sat Apr  2 21:47:30 2022 daemon.warn openvpn(custom_config)[4042]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:47:30 2022 daemon.warn openvpn(custom_config)[4042]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=7ae47e05 3c182ef7
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY KU OK
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: Validating certificate extended key usage
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY EKU OK
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:32 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:37 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: route-related options modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Using peer cipher 'AES-128-CBC'
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 21:47:42 2022 daemon.err openvpn(custom_config)[4042]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Exiting due to fatal error
Sat Apr  2 21:47:47 2022 daemon.warn openvpn(custom_config)[4051]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 21:47:47 2022 daemon.warn openvpn(custom_config)[4051]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP_CLIENT link local: (not bound)
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=be6d2f04 b01d4d65
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY KU OK
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Validating certificate extended key usage
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY EKU OK
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 21:47:48 2022 daemon.notice openvpn(custom_config)[4051]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)

258

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

Sat Apr  2 21:46:01 2022 daemon.err openvpn(custom_config)[2931]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Exiting due to fatal error

Nie masz zainstalowanego pakietu kmod-tun?

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

259

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

zaktualizowalem liste i.... widze tylko mozliwosc zainstalowania
kmod
libkmod
open-plc-utils-int6kmod

czyli zainstalowac ten pierwszy?

260

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

Nie. kmod-tun. On zresztą jest chyba zależnością openvpn.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

261

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

sprawdzilem w luci w zainstalowanych i jest zainstalowany kmod-tun

262

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

zrób

lsmod | grep tun

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

263

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

nadal bez zmian

Sat Apr  2 22:37:45 2022 daemon.notice openvpn(custom_config)[3874]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr  2 22:37:45 2022 daemon.notice openvpn(custom_config)[3874]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr  2 22:37:45 2022 daemon.err openvpn(custom_config)[3874]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr  2 22:37:45 2022 daemon.notice openvpn(custom_config)[3874]: Exiting due to fatal error
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:46 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:49 2022 daemon.warn odhcpd[1864]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr  2 22:37:49 2022 daemon.err odhcpd[1864]: Failed to send to ff02::1%lan@br-lan (Address not available)
Sat Apr  2 22:37:50 2022 daemon.warn openvpn(custom_config)[3931]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
Sat Apr  2 22:37:50 2022 daemon.warn openvpn(custom_config)[3931]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP_CLIENT link local: (not bound)
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=d68dfd65 7fee1387
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY KU OK
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Validating certificate extended key usage
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY EKU OK
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr  2 22:37:50 2022 daemon.notice openvpn(custom_config)[3931]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr  2 22:37:52 2022 daemon.notice openvpn(custom_config)[3931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:52 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:53 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:54 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:54 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:54 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:57 2022 daemon.notice openvpn(custom_config)[3931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:58 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr  2 22:37:59 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko

264

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

Co nadal bez zmian? Pisałem żebyś to wykonał żeby pokazać czy masz moduł załadowany, a nie że to cudowne panaceum leczące całe zło tego świata. Jeszcze nie ten etap.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

265

Odp: Użycie komercyjnego klienta OpenVPN w OpenWrt.

Cezary napisał/a:

Co nadal bez zmian? Pisałem żebyś to wykonał żeby pokazać czy masz moduł załadowany, a nie że to cudowne panaceum leczące całe zło tego świata. Jeszcze nie ten etap.

wiesz co, kilka razy go zresetowalem i.... dziala.... i nawet wifi wstalo

 | Machine: Netgear R6220                                                    |
 | Uptime: 0d, 00:02:54                                                      |
 | Load: 0.19 0.26 0.11                                                      |
 | Flash: total: 14.1MB, free: 13.3MB, used: 0%                              |
 | Memory: total: 119.5MB, free: 90.9MB, used: 23%                           |
 | Leases: 1                                                                 |
 | lan: static, 192.168.1.1                                                  |
 | wan: dhcp, 192.168.68.21                                                  |
 | wan6: dhcpv6, ?                                                           |
 | vpn: none, ?                                                              |
 | radio0: lan, mode: ap, ssid: coolhat206, channel: 36, conn: 1             |
 -----------------------------------------------------------------------------
root@OpenWrt:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         10.100.201.254  128.0.0.0       UG    0      0        0 tun0
0.0.0.0         192.168.68.1    0.0.0.0         UG    0      0        0 wan
10.100.200.0    0.0.0.0         255.255.252.0   U     0      0        0 tun0
31.186.82.54    192.168.68.1    255.255.255.255 UGH   0      0        0 wan
128.0.0.0       10.100.201.254  128.0.0.0       UG    0      0        0 tun0
192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        0 br-lan
192.168.68.0    0.0.0.0         255.255.255.0   U     0      0        0 wan
root@OpenWrt:~#