76

Odp: Problemy z obrazem MIFI

Ale ty chyba wiesz że to serwer wysyła do klienta adresację, trasy i inne takie a nie klient to ma zdefiniowane...

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

77

Odp: Problemy z obrazem MIFI

Fakt. Coś mnie przymuliło sorki. Wstydzę się sad

78

Odp: Problemy z obrazem MIFI

Kontynuuję tutaj, bo ten wątek jest bardziej odpowiedni, niż USSD.
Zrobiłem świeżą instalkę i nic poza sprawdzaniem vpna.
Wygląda na to, że na wolfssl ewidentnie nie rusza i trzeba podmieniać na openvpn-openssl

79

Odp: Problemy z obrazem MIFI

Pokaż logi z takiej próby połączenia.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

80

Odp: Problemy z obrazem MIFI

dać od nowa, czy wystarczy Ci zajrzeć do postu 58?

81

Odp: Problemy z obrazem MIFI

Od nowa daj logi. Na konfigu który wiesz że działa w wersji z openssl.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

82

Odp: Problemy z obrazem MIFI

root@MiFi:~# logread | grep -i openvpn
Wed Jan 25 01:26:30 2023 daemon.warn openvpn(iwzqsogy)[2641]: Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
Wed Jan 25 01:26:30 2023 daemon.warn openvpn(iwzqsogy)[2641]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Wed Jan 25 01:26:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: OpenVPN 2.5.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Jan 25 01:26:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Wed Jan 25 01:26:30 2023 daemon.warn openvpn(iwzqsogy)[2641]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 01:26:31 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.81:443
Wed Jan 25 01:26:31 2023 daemon.notice openvpn(iwzqsogy)[2641]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 01:26:31 2023 daemon.notice openvpn(iwzqsogy)[2641]: Attempting to establish TCP connection with [AF_INET]185.65.135.81:443 [nonblock]
Wed Jan 25 01:26:31 2023 daemon.err openvpn(iwzqsogy)[2641]: TCP: connect to [AF_INET]185.65.135.81:443 failed: Network unreachable
Wed Jan 25 01:26:31 2023 daemon.notice openvpn(iwzqsogy)[2641]: SIGUSR1[connection failed(soft),init_instance] received, process restarting
Wed Jan 25 01:26:31 2023 daemon.notice openvpn(iwzqsogy)[2641]: Restart pause, 5 second(s)
Wed Jan 25 01:26:36 2023 daemon.warn openvpn(iwzqsogy)[2641]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 01:26:36 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.80:443
Wed Jan 25 01:26:36 2023 daemon.notice openvpn(iwzqsogy)[2641]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 01:26:36 2023 daemon.notice openvpn(iwzqsogy)[2641]: Attempting to establish TCP connection with [AF_INET]185.65.135.80:443 [nonblock]
Wed Jan 25 01:26:36 2023 daemon.err openvpn(iwzqsogy)[2641]: TCP: connect to [AF_INET]185.65.135.80:443 failed: Network unreachable
Wed Jan 25 01:26:36 2023 daemon.notice openvpn(iwzqsogy)[2641]: SIGUSR1[connection failed(soft),init_instance] received, process restarting
Wed Jan 25 01:26:36 2023 daemon.notice openvpn(iwzqsogy)[2641]: Restart pause, 5 second(s)
Wed Jan 25 01:26:41 2023 daemon.warn openvpn(iwzqsogy)[2641]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 01:26:41 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.83:443
Wed Jan 25 01:26:41 2023 daemon.notice openvpn(iwzqsogy)[2641]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 01:26:41 2023 daemon.notice openvpn(iwzqsogy)[2641]: Attempting to establish TCP connection with [AF_INET]185.65.135.83:443 [nonblock]
Wed Jan 25 01:26:41 2023 daemon.err openvpn(iwzqsogy)[2641]: TCP: connect to [AF_INET]185.65.135.83:443 failed: Network unreachable
Wed Jan 25 01:26:41 2023 daemon.notice openvpn(iwzqsogy)[2641]: SIGUSR1[connection failed(soft),init_instance] received, process restarting
Wed Jan 25 01:26:41 2023 daemon.notice openvpn(iwzqsogy)[2641]: Restart pause, 5 second(s)
Wed Jan 25 01:26:47 2023 daemon.warn openvpn(iwzqsogy)[2641]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 01:26:47 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.82:443
Wed Jan 25 01:26:47 2023 daemon.notice openvpn(iwzqsogy)[2641]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 01:26:47 2023 daemon.notice openvpn(iwzqsogy)[2641]: Attempting to establish TCP connection with [AF_INET]185.65.135.82:443 [nonblock]
Wed Jan 25 01:26:47 2023 daemon.err openvpn(iwzqsogy)[2641]: TCP: connect to [AF_INET]185.65.135.82:443 failed: Network unreachable
Wed Jan 25 01:26:47 2023 daemon.notice openvpn(iwzqsogy)[2641]: SIGUSR1[connection failed(soft),init_instance] received, process restarting
Wed Jan 25 01:26:47 2023 daemon.notice openvpn(iwzqsogy)[2641]: Restart pause, 5 second(s)
Wed Jan 25 01:26:52 2023 daemon.warn openvpn(iwzqsogy)[2641]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 01:26:52 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.81:443
Wed Jan 25 01:26:52 2023 daemon.notice openvpn(iwzqsogy)[2641]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 01:26:52 2023 daemon.notice openvpn(iwzqsogy)[2641]: Attempting to establish TCP connection with [AF_INET]185.65.135.81:443 [nonblock]
Wed Jan 25 01:26:52 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP connection established with [AF_INET]185.65.135.81:443
Wed Jan 25 01:26:52 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP_CLIENT link local: (not bound)
Wed Jan 25 01:26:52 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP_CLIENT link remote: [AF_INET]185.65.135.81:443
Wed Jan 25 01:26:52 2023 daemon.notice openvpn(iwzqsogy)[2641]: TLS: Initial packet from [AF_INET]185.65.135.81:443, sid=447a3798 0436d476
Wed Jan 25 01:26:53 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
Wed Jan 25 01:26:53 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v5, emailAddress=security@mullvad.net
Wed Jan 25 01:26:53 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY KU OK
Wed Jan 25 01:26:53 2023 daemon.notice openvpn(iwzqsogy)[2641]: Validating certificate extended key usage
Wed Jan 25 01:26:53 2023 daemon.notice openvpn(iwzqsogy)[2641]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Jan 25 01:26:53 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY EKU OK
Wed Jan 25 01:26:53 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=0, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=se-sto-ovpn-002.mullvad.net, emailAddress=security@mullvad.net
Wed Jan 25 01:26:54 2023 daemon.warn openvpn(iwzqsogy)[2641]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1560'
Wed Jan 25 01:26:54 2023 daemon.warn openvpn(iwzqsogy)[2641]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Wed Jan 25 01:26:54 2023 daemon.notice openvpn(iwzqsogy)[2641]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Wed Jan 25 01:26:54 2023 daemon.notice openvpn(iwzqsogy)[2641]: [se-sto-ovpn-002.mullvad.net] Peer Connection Initiated with [AF_INET]185.65.135.81:443
Wed Jan 25 12:48:17 2023 daemon.notice openvpn(iwzqsogy)[2641]: SENT CONTROL [se-sto-ovpn-002.mullvad.net]: 'PUSH_REQUEST' (status=1)
Wed Jan 25 12:48:17 2023 daemon.notice openvpn(iwzqsogy)[2641]: [se-sto-ovpn-002.mullvad.net] Inactivity timeout (--ping-restart), restarting
Wed Jan 25 12:48:17 2023 daemon.notice openvpn(iwzqsogy)[2641]: SIGUSR1[soft,ping-restart] received, process restarting
Wed Jan 25 12:48:17 2023 daemon.notice openvpn(iwzqsogy)[2641]: Restart pause, 5 second(s)
Wed Jan 25 12:48:22 2023 daemon.warn openvpn(iwzqsogy)[2641]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.80:443
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: Attempting to establish TCP connection with [AF_INET]185.65.135.80:443 [nonblock]
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP connection established with [AF_INET]185.65.135.80:443
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP_CLIENT link local: (not bound)
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP_CLIENT link remote: [AF_INET]185.65.135.80:443
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: TLS: Initial packet from [AF_INET]185.65.135.80:443, sid=518aeb45 96625766
Wed Jan 25 12:48:22 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v5, emailAddress=security@mullvad.net
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY KU OK
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: Validating certificate extended key usage
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY EKU OK
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=0, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=se-sto-ovpn-001.mullvad.net, emailAddress=security@mullvad.net
Wed Jan 25 12:48:23 2023 daemon.warn openvpn(iwzqsogy)[2641]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1560'
Wed Jan 25 12:48:23 2023 daemon.warn openvpn(iwzqsogy)[2641]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Wed Jan 25 12:48:23 2023 daemon.notice openvpn(iwzqsogy)[2641]: [se-sto-ovpn-001.mullvad.net] Peer Connection Initiated with [AF_INET]185.65.135.80:443
Wed Jan 25 12:48:24 2023 daemon.notice openvpn(iwzqsogy)[2641]: SENT CONTROL [se-sto-ovpn-001.mullvad.net]: 'PUSH_REQUEST' (status=1)
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: SENT CONTROL [se-sto-ovpn-001.mullvad.net]: 'PUSH_REQUEST' (status=1)
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.5.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.5.0.1,topology subnet,socket-flags TCP_NODELAY,ifconfig-ipv6 fdda:d0d0:cafe:443::1001/64 fdda:d0d0:cafe:443::,ifconfig 10.5.0.3 255.255.0.0,peer-id 0,cipher AES-256-GCM'
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: compression parms modified
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: --socket-flags option modified
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: --ifconfig/up options modified
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: route options modified
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: route-related options modified
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: peer-id set
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: adjusting link_mtu to 1626
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: data channel crypto options modified
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_best_gw query: dst 0.0.0.0
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_best_gw result: via 100.123.4.149 dev wwan0
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: GDG6: remote_host_ipv6=n/a
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_best_gw query: dst ::
Wed Jan 25 12:48:29 2023 daemon.warn openvpn(iwzqsogy)[2641]: sitnl_send: rtnl: generic error (-128): Network unreachable
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: TUN/TAP device iwzqsogy opened
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_mtu_set: mtu 1500 for iwzqsogy
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_up: set iwzqsogy up
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v4_add: 10.5.0.3/16 dev iwzqsogy
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_mtu_set: mtu 1500 for iwzqsogy
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_up: set iwzqsogy up
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v6_add: fdda:d0d0:cafe:443::1001/64 dev iwzqsogy
Wed Jan 25 12:48:29 2023 daemon.notice openvpn(iwzqsogy)[2641]: /usr/libexec/openvpn-hotplug up iwzqsogy iwzqsogy 1500 1554 10.5.0.3 255.255.0.0 init
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_add: 185.65.135.80/32 via 100.123.4.149 dev [NULL] table 0 metric -1
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_add: 0.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_add: 128.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: ::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: 4000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: 8000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: c000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 12:48:30 2023 daemon.warn openvpn(iwzqsogy)[2641]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Jan 25 12:48:30 2023 daemon.notice openvpn(iwzqsogy)[2641]: Initialization Sequence Completed
Wed Jan 25 13:07:08 2023 daemon.err openvpn(iwzqsogy)[2641]: Connection reset, restarting [0]
Wed Jan 25 13:07:08 2023 daemon.notice openvpn(iwzqsogy)[2641]: SIGUSR1[soft,connection-reset] received, process restarting
Wed Jan 25 13:07:08 2023 daemon.notice openvpn(iwzqsogy)[2641]: Restart pause, 5 second(s)
Wed Jan 25 13:07:13 2023 daemon.warn openvpn(iwzqsogy)[2641]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.80:443
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: Attempting to establish TCP connection with [AF_INET]185.65.135.80:443 [nonblock]
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP connection established with [AF_INET]185.65.135.80:443
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP_CLIENT link local: (not bound)
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: TCP_CLIENT link remote: [AF_INET]185.65.135.80:443
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: TLS: Initial packet from [AF_INET]185.65.135.80:443, sid=53074eaf 699c5833
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v5, emailAddress=security@mullvad.net
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY KU OK
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: Validating certificate extended key usage
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY EKU OK
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: VERIFY OK: depth=0, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=se-sto-ovpn-001.mullvad.net, emailAddress=security@mullvad.net
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Wed Jan 25 13:07:13 2023 daemon.notice openvpn(iwzqsogy)[2641]: [se-sto-ovpn-001.mullvad.net] Peer Connection Initiated with [AF_INET]185.65.135.80:443
Wed Jan 25 13:07:14 2023 daemon.notice openvpn(iwzqsogy)[2641]: SENT CONTROL [se-sto-ovpn-001.mullvad.net]: 'PUSH_REQUEST' (status=1)
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: SENT CONTROL [se-sto-ovpn-001.mullvad.net]: 'PUSH_REQUEST' (status=1)
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.5.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.5.0.1,topology subnet,socket-flags TCP_NODELAY,ifconfig-ipv6 fdda:d0d0:cafe:443::1012/64 fdda:d0d0:cafe:443::,ifconfig 10.5.0.20 255.255.0.0,peer-id 0,cipher AES-256-GCM'
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: compression parms modified
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: --socket-flags option modified
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: --ifconfig/up options modified
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: route options modified
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: route-related options modified
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: peer-id set
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: adjusting link_mtu to 1627
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: OPTIONS IMPORT: data channel crypto options modified
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: Preserving previous TUN/TAP instance: iwzqsogy
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_del: 185.65.135.80/32 via 100.123.4.149 dev [NULL] table 0 metric -1
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_del: 0.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_del: 128.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(::/2)
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: ::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(4000::/2)
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: 4000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(8000::/2)
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: 8000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(c000::/2)
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: c000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: Closing TUN/TAP interface
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v4_del: 10.5.0.3 dev iwzqsogy
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v6_del: fdda:d0d0:cafe:443::1001/64 dev iwzqsogy
Wed Jan 25 13:07:20 2023 daemon.notice openvpn(iwzqsogy)[2641]: /usr/libexec/openvpn-hotplug down iwzqsogy iwzqsogy 1500 1555 10.5.0.3 255.255.0.0 init
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_best_gw query: dst 0.0.0.0
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_best_gw result: via 100.123.4.149 dev wwan0
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: GDG6: remote_host_ipv6=n/a
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_best_gw query: dst ::
Wed Jan 25 13:07:21 2023 daemon.warn openvpn(iwzqsogy)[2641]: sitnl_send: rtnl: generic error (-128): Network unreachable
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: TUN/TAP device iwzqsogy opened
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_mtu_set: mtu 1500 for iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_up: set iwzqsogy up
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v4_add: 10.5.0.20/16 dev iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_mtu_set: mtu 1500 for iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_iface_up: set iwzqsogy up
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v6_add: fdda:d0d0:cafe:443::1012/64 dev iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: /usr/libexec/openvpn-hotplug up iwzqsogy iwzqsogy 1500 1555 10.5.0.20 255.255.0.0 init
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_add: 185.65.135.80/32 via 100.123.4.149 dev [NULL] table 0 metric -1
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_add: 0.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_add: 128.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: ::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: 4000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: 8000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_add: c000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:07:21 2023 daemon.notice openvpn(iwzqsogy)[2641]: Initialization Sequence Completed

83

Odp: Problemy z obrazem MIFI

Dziwne to jest, bo do połączenia dochodzi, a później masz timeout, restart, connection reset.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

84

Odp: Problemy z obrazem MIFI

Może go coś zmuliło przy starcie routera?
Zrobiłem tak:
/etc/init.d/log restart (nie wiem czy potrzebne)
reboot
logread

85

Odp: Problemy z obrazem MIFI

Mogę jeszcze zrobić bez reboota opnevpn stop i start

86

Odp: Problemy z obrazem MIFI

root@MiFi:~# /etc/init.d/log restart
root@MiFi:~# /etc/init.d/openvpn stop
root@MiFi:~# /etc/init.d/openvpn start
root@MiFi:~# logread | grep -i openvpn
Wed Jan 25 13:33:39 2023 daemon.err openvpn(iwzqsogy)[2641]: event_wait : Interrupted system call (code=4)
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_del: 185.65.135.80/32 via 100.123.4.149 dev [NULL] table 0 metric -1
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_del: 0.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v4_del: 128.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(::/2)
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: ::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(4000::/2)
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: 4000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(8000::/2)
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: 8000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: delete_route_ipv6(c000::/2)
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_route_v6_del: c000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: Closing TUN/TAP interface
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v4_del: 10.5.0.20 dev iwzqsogy
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: net_addr_v6_del: fdda:d0d0:cafe:443::1012/64 dev iwzqsogy
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: /usr/libexec/openvpn-hotplug down iwzqsogy iwzqsogy 1500 1555 10.5.0.20 255.255.0.0 init
Wed Jan 25 13:33:39 2023 daemon.notice openvpn(iwzqsogy)[2641]: SIGTERM[hard,] received, process exiting
Wed Jan 25 13:33:56 2023 daemon.warn openvpn(iwzqsogy)[5690]: Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
Wed Jan 25 13:33:56 2023 daemon.warn openvpn(iwzqsogy)[5690]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: OpenVPN 2.5.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Wed Jan 25 13:33:56 2023 daemon.warn openvpn(iwzqsogy)[5690]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.135.80:443
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: Socket Buffers: R=[131072->360448] S=[16384->360448]
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: Attempting to establish TCP connection with [AF_INET]185.65.135.80:443 [nonblock]
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: TCP connection established with [AF_INET]185.65.135.80:443
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: TCP_CLIENT link local: (not bound)
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: TCP_CLIENT link remote: [AF_INET]185.65.135.80:443
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: TLS: Initial packet from [AF_INET]185.65.135.80:443, sid=32f8d90d 977d4604
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v5, emailAddress=security@mullvad.net
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: VERIFY KU OK
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: Validating certificate extended key usage
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: VERIFY EKU OK
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: VERIFY OK: depth=0, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=se-sto-ovpn-001.mullvad.net, emailAddress=security@mullvad.net
Wed Jan 25 13:33:56 2023 daemon.warn openvpn(iwzqsogy)[5690]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1560'
Wed Jan 25 13:33:56 2023 daemon.warn openvpn(iwzqsogy)[5690]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Wed Jan 25 13:33:56 2023 daemon.notice openvpn(iwzqsogy)[5690]: [se-sto-ovpn-001.mullvad.net] Peer Connection Initiated with [AF_INET]185.65.135.80:443
Wed Jan 25 13:33:58 2023 daemon.notice openvpn(iwzqsogy)[5690]: SENT CONTROL [se-sto-ovpn-001.mullvad.net]: 'PUSH_REQUEST' (status=1)
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: SENT CONTROL [se-sto-ovpn-001.mullvad.net]: 'PUSH_REQUEST' (status=1)
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.5.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.5.0.1,topology subnet,socket-flags TCP_NODELAY,ifconfig-ipv6 fdda:d0d0:cafe:443::1012/64 fdda:d0d0:cafe:443::,ifconfig 10.5.0.20 255.255.0.0,peer-id 0,cipher AES-256-GCM'
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: compression parms modified
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: --socket-flags option modified
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: --ifconfig/up options modified
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: route options modified
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: route-related options modified
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: peer-id set
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: adjusting link_mtu to 1626
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: OPTIONS IMPORT: data channel crypto options modified
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v4_best_gw query: dst 0.0.0.0
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v4_best_gw result: via 100.123.4.149 dev wwan0
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: GDG6: remote_host_ipv6=n/a
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v6_best_gw query: dst ::
Wed Jan 25 13:34:03 2023 daemon.warn openvpn(iwzqsogy)[5690]: sitnl_send: rtnl: generic error (-128): Network unreachable
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: TUN/TAP device iwzqsogy opened
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_iface_mtu_set: mtu 1500 for iwzqsogy
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_iface_up: set iwzqsogy up
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_addr_v4_add: 10.5.0.20/16 dev iwzqsogy
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_iface_mtu_set: mtu 1500 for iwzqsogy
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_iface_up: set iwzqsogy up
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_addr_v6_add: fdda:d0d0:cafe:443::1012/64 dev iwzqsogy
Wed Jan 25 13:34:03 2023 daemon.notice openvpn(iwzqsogy)[5690]: /usr/libexec/openvpn-hotplug up iwzqsogy iwzqsogy 1500 1554 10.5.0.20 255.255.0.0 init
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v4_add: 185.65.135.80/32 via 100.123.4.149 dev [NULL] table 0 metric -1
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v4_add: 0.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v4_add: 128.0.0.0/1 via 10.5.0.1 dev [NULL] table 0 metric -1
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: add_route_ipv6(::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v6_add: ::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v6_add: 4000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v6_add: 8000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev iwzqsogy
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: net_route_v6_add: c000::/2 via :: dev iwzqsogy table 0 metric -1
Wed Jan 25 13:34:04 2023 daemon.warn openvpn(iwzqsogy)[5690]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Jan 25 13:34:04 2023 daemon.notice openvpn(iwzqsogy)[5690]: Initialization Sequence Completed