wlasnie probuje odpalic openvpna na innym routerze r6220 i nie mam w ogole internetu nie mowiac juz o vpnie. Wszystko zrobilem jak poprzednio (wlacznie ze skopiowaniem z poprzedniego routera dzialajacego pliku ovpn). Mozecie zerknac co jest nie tak?
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain test
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain onion
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain localhost
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain local
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain invalid
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain bind
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain lan
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain test
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain onion
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain localhost
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain local
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain invalid
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain bind
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using only locally-known addresses for domain lan
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: using nameserver 192.168.68.1#53
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr 2 21:44:53 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr 2 21:44:53 2022 user.notice ddns-scripts[2596]: myddns_ipv4: PID '2596' started at 2022-04-02 21:44
Sat Apr 2 21:44:54 2022 daemon.info dnsmasq[2727]: read /etc/hosts - 4 addresses
Sat Apr 2 21:44:54 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr 2 21:44:54 2022 daemon.info dnsmasq[2727]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr 2 21:44:54 2022 daemon.info dnsmasq-dhcp[2727]: read /etc/ethers - 0 addresses
Sat Apr 2 21:44:54 2022 daemon.info dnsmasq[2727]: exiting on receipt of SIGTERM
Sat Apr 2 21:44:54 2022 user.warn ddns-scripts[2596]: myddns_ipv4: Service section disabled! - TERMINATE
Sat Apr 2 21:44:55 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Sat Apr 2 21:44:55 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Sat Apr 2 21:44:55 2022 user.warn ddns-scripts[2596]: myddns_ipv4: PID '2596' exit WITH ERROR '1' at 2022-04-02 21:44
Sat Apr 2 21:44:55 2022 user.notice dnsmasq: Allowing RFC1918 responses for domain free.aero2.net.pl
Sat Apr 2 21:44:55 2022 daemon.notice netifd: Interface 'wan6' is now up
Sat Apr 2 21:44:56 2022 user.notice vpnbypass [3051]: service monitoring interfaces: wan
Sat Apr 2 21:44:56 2022 daemon.warn openvpn(custom_config)[2931]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:44:56 2022 daemon.warn openvpn(custom_config)[2931]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:44:56 2022 user.notice firewall: Reloading firewall due to ifup of wan6 (wan)
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=2fdbb31c 27ee83ae
Sat Apr 2 21:44:56 2022 daemon.warn odhcpd[1876]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY KU OK
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Validating certificate extended key usage
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY EKU OK
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:44:56 2022 daemon.notice procd: /etc/rc.d/S96led: setting up led wan
Sat Apr 2 21:44:56 2022 daemon.notice openvpn(custom_config)[2931]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_core.ko
Sat Apr 2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_netlink.ko
Sat Apr 2 21:44:57 2022 daemon.err modprobe: failed to mmap /lib/modules/5.4.124/l2tp_ppp.ko
Sat Apr 2 21:44:57 2022 daemon.err ksmbd: modprobe of ksmbd module failed, can\'t start ksmbd!
Sat Apr 2 21:44:57 2022 user.notice ddns-scripts[3297]: myddns_ipv6: PID '3297' started at 2022-04-02 21:44
Sat Apr 2 21:44:57 2022 daemon.warn odhcpd[1876]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
Sat Apr 2 21:44:58 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:44:58 2022 user.warn ddns-scripts[3297]: myddns_ipv6: Service section disabled! - TERMINATE
Sat Apr 2 21:44:58 2022 user.warn ddns-scripts[3297]: myddns_ipv6: PID '3297' exit WITH ERROR '1' at 2022-04-02 21:44
Sat Apr 2 21:44:58 2022 daemon.err wsdd2: samba36/4 or ksmbd is not running, can't start wsdd2!
Sat Apr 2 21:44:58 2022 daemon.info procd: - init complete -
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: Connected to system UBus
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: started, version 2.85 cachesize 150
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: DNS service limited to local subnets
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: UBus support enabled: connected to system bus
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq-dhcp[3686]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain test
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain onion
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain localhost
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain local
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain invalid
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain bind
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain lan
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain test
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain onion
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain localhost
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain local
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain invalid
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain bind
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using only locally-known addresses for domain lan
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using nameserver 192.168.68.1#53
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: using nameserver fd00::de39:6fff:fea6:1732#53
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: read /etc/hosts - 4 addresses
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr 2 21:45:52 2022 daemon.info dnsmasq-dhcp[3686]: read /etc/ethers - 0 addresses
Sat Apr 2 21:45:52 2022 user.info adblock-4.1.3[1708]: adblock is currently disabled, please set the config option 'adb_enabled' to '1' to use this service
Sat Apr 2 21:45:53 2022 daemon.info dnsmasq[3686]: read /etc/hosts - 4 addresses
Sat Apr 2 21:45:53 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/odhcpd - 1 addresses
Sat Apr 2 21:45:53 2022 daemon.info dnsmasq[3686]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Sat Apr 2 21:45:53 2022 daemon.info dnsmasq-dhcp[3686]: read /etc/ethers - 0 addresses
Sat Apr 2 21:45:56 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:45:56 2022 daemon.info dnsmasq-dhcp[3686]: DHCPREQUEST(br-lan) 192.168.1.119 00:26:b9:b5:ff:f6
Sat Apr 2 21:45:56 2022 daemon.info dnsmasq-dhcp[3686]: DHCPACK(br-lan) 192.168.1.119 00:26:b9:b5:ff:f6 DESKTOP-LHVRJJR
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: route-related options modified
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Using peer cipher 'AES-128-CBC'
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr 2 21:46:01 2022 daemon.err openvpn(custom_config)[2931]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr 2 21:46:01 2022 daemon.notice openvpn(custom_config)[2931]: Exiting due to fatal error
Sat Apr 2 21:46:06 2022 daemon.warn openvpn(custom_config)[3976]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:46:06 2022 daemon.warn openvpn(custom_config)[3976]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=ef6cb950 6070466f
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY KU OK
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Validating certificate extended key usage
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY EKU OK
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:46:06 2022 daemon.notice openvpn(custom_config)[3976]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:07 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:13 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:16 2022 daemon.err uhttpd[2242]: luci: accepted login on /admin/status/syslog for root from 192.168.1.119
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: route-related options modified
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Using peer cipher 'AES-128-CBC'
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr 2 21:46:18 2022 daemon.err openvpn(custom_config)[3976]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr 2 21:46:18 2022 daemon.notice openvpn(custom_config)[3976]: Exiting due to fatal error
Sat Apr 2 21:46:23 2022 daemon.warn openvpn(custom_config)[4030]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:46:23 2022 daemon.warn openvpn(custom_config)[4030]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=c9c51db8 4f91e102
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY KU OK
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Validating certificate extended key usage
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY EKU OK
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:46:23 2022 daemon.notice openvpn(custom_config)[4030]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:24 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:29 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: route-related options modified
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Using peer cipher 'AES-128-CBC'
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr 2 21:46:35 2022 daemon.err openvpn(custom_config)[4030]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr 2 21:46:35 2022 daemon.notice openvpn(custom_config)[4030]: Exiting due to fatal error
Sat Apr 2 21:46:40 2022 daemon.warn openvpn(custom_config)[4031]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:46:40 2022 daemon.warn openvpn(custom_config)[4031]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=81c34d95 dec6b617
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY KU OK
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Validating certificate extended key usage
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY EKU OK
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:46:40 2022 daemon.notice openvpn(custom_config)[4031]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:41 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:46 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: route-related options modified
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Using peer cipher 'AES-128-CBC'
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr 2 21:46:51 2022 daemon.err openvpn(custom_config)[4031]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr 2 21:46:51 2022 daemon.notice openvpn(custom_config)[4031]: Exiting due to fatal error
Sat Apr 2 21:46:56 2022 daemon.warn openvpn(custom_config)[4032]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:46:56 2022 daemon.warn openvpn(custom_config)[4032]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:46:56 2022 daemon.notice openvpn(custom_config)[4032]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=da4a591e 36c78dc7
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY KU OK
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: Validating certificate extended key usage
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY EKU OK
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:46:57 2022 daemon.notice openvpn(custom_config)[4032]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:46:58 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:03 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: route-related options modified
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Using peer cipher 'AES-128-CBC'
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr 2 21:47:08 2022 daemon.err openvpn(custom_config)[4032]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr 2 21:47:08 2022 daemon.notice openvpn(custom_config)[4032]: Exiting due to fatal error
Sat Apr 2 21:47:13 2022 daemon.warn openvpn(custom_config)[4033]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:47:13 2022 daemon.warn openvpn(custom_config)[4033]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:13 2022 daemon.notice openvpn(custom_config)[4033]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=914e7942 aa3a385f
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY KU OK
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: Validating certificate extended key usage
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY EKU OK
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:47:14 2022 daemon.notice openvpn(custom_config)[4033]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:15 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:20 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: route-related options modified
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Using peer cipher 'AES-128-CBC'
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr 2 21:47:25 2022 daemon.err openvpn(custom_config)[4033]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr 2 21:47:25 2022 daemon.notice openvpn(custom_config)[4033]: Exiting due to fatal error
Sat Apr 2 21:47:30 2022 daemon.warn openvpn(custom_config)[4042]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:47:30 2022 daemon.warn openvpn(custom_config)[4042]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:30 2022 daemon.notice openvpn(custom_config)[4042]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=7ae47e05 3c182ef7
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY KU OK
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: Validating certificate extended key usage
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY EKU OK
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:47:31 2022 daemon.notice openvpn(custom_config)[4042]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:32 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:37 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 208.67.220.220,dhcp-option DNS 208.67.222.222,inactive 86400,ping 20,ping-restart 60,topology subnet,route-gateway 10.100.201.254,ifconfig 10.100.201.91 255.255.252.0'
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: route-related options modified
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Using peer cipher 'AES-128-CBC'
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: net_route_v4_best_gw result: via 192.168.68.1 dev wan
Sat Apr 2 21:47:42 2022 daemon.err openvpn(custom_config)[4042]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Sat Apr 2 21:47:42 2022 daemon.notice openvpn(custom_config)[4042]: Exiting due to fatal error
Sat Apr 2 21:47:47 2022 daemon.warn openvpn(custom_config)[4051]: DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: OpenVPN 2.5.3 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Sat Apr 2 21:47:47 2022 daemon.warn openvpn(custom_config)[4051]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Attempting to establish TCP connection with [AF_INET]31.186.82.54:993 [nonblock]
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP connection established with [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP_CLIENT link local: (not bound)
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TCP_CLIENT link remote: [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: TLS: Initial packet from [AF_INET]31.186.82.54:993, sid=be6d2f04 b01d4d65
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=3, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=2, C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Global Services CA SHA2
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=1, C=PL, O=home.pl S.A., CN=Certyfikat SSL
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY KU OK
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Validating certificate extended key usage
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY EKU OK
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: VERIFY OK: depth=0, CN=*.vpnonline.eu
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sat Apr 2 21:47:47 2022 daemon.notice openvpn(custom_config)[4051]: [*.vpnonline.eu] Peer Connection Initiated with [AF_INET]31.186.82.54:993
Sat Apr 2 21:47:48 2022 daemon.notice openvpn(custom_config)[4051]: SENT CONTROL [*.vpnonline.eu]: 'PUSH_REQUEST' (status=1)