Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
May 30 20:25:31 ovpn-client1[11506]: TLS: tls_process: killed expiring key
May 30 20:25:31 ovpn-client1[11506]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
May 30 20:25:31 ovpn-client1[11506]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
May 30 20:25:31 ovpn-client1[11506]: VERIFY KU OK
May 30 20:25:31 ovpn-client1[11506]: Validating certificate extended key usage
May 30 20:25:31 ovpn-client1[11506]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
May 30 20:25:31 ovpn-client1[11506]: VERIFY EKU OK
May 30 20:25:31 ovpn-client1[11506]: VERIFY OK: depth=0, CN=us4921.nordvpn.com
May 30 20:25:33 ovpn-client1[11506]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
May 30 20:25:33 ovpn-client1[11506]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
May 30 20:25:33 ovpn-client1[11506]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
May 30 20:30:24 acsd: selected channel spec: 0x1904 (6u)
May 30 20:30:24 acsd: Adjusted channel spec: 0x1904 (6u)
May 30 20:30:24 acsd: selected channel spec: 0x1904 (6u)
May 30 20:30:24 acsd: acs_set_chspec: 0x1904 (6u) for reason APCS_CSTIMER
May 30 20:34:34 ovpn-client1[11506]: [us4921.nordvpn.com] Inactivity timeout (--ping-restart), restarting
May 30 20:34:34 ovpn-client1[11506]: SIGUSR1[soft,ping-restart] received, process restarting
May 30 20:34:34 ovpn-client1[11506]: Restart pause, 5 second(s)
May 30 20:34:39 ovpn-client1[11506]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
May 30 20:34:39 ovpn-client1[11506]: TCP/UDP: Preserving recently used remote address: [AF_INET]64.44.32.115:1194
May 30 20:34:39 ovpn-client1[11506]: Socket Buffers: R=[122880->245760] S=[122880->245760]
May 30 20:34:39 ovpn-client1[11506]: UDP link local: (not bound)
May 30 20:34:39 ovpn-client1[11506]: UDP link remote: [AF_INET]64.44.32.115:1194
May 30 20:34:39 ovpn-client1[11506]: TLS: Initial packet from [AF_INET]64.44.32.115:1194, sid=bb7bd151 75235bfc
May 30 20:34:40 ovpn-client1[11506]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
May 30 20:34:40 ovpn-client1[11506]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
May 30 20:34:40 ovpn-client1[11506]: VERIFY KU OK
May 30 20:34:40 ovpn-client1[11506]: Validating certificate extended key usage
May 30 20:34:40 ovpn-client1[11506]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
May 30 20:34:40 ovpn-client1[11506]: VERIFY EKU OK
May 30 20:34:40 ovpn-client1[11506]: VERIFY OK: depth=0, CN=us4921.nordvpn.com
May 30 20:34:40 ovpn-client1[11506]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
May 30 20:34:40 ovpn-client1[11506]: [us4921.nordvpn.com] Peer Connection Initiated with [AF_INET]64.44.32.115:1194
May 30 20:34:41 ovpn-client1[11506]: SENT CONTROL [us4921.nordvpn.com]: 'PUSH_REQUEST' (status=1)
May 30 20:34:41 ovpn-client1[11506]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.38 255.255.255.0,peer-id 37,cipher AES-256-GCM'
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: timers and/or timeouts modified
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: explicit notify parm(s) modified
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: compression parms modified
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
May 30 20:34:41 ovpn-client1[11506]: Socket Buffers: R=[245760->245760] S=[245760->245760]
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: --ifconfig/up options modified
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: route options modified
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: route-related options modified
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: peer-id set
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: adjusting link_mtu to 1657
May 30 20:34:41 ovpn-client1[11506]: OPTIONS IMPORT: data channel crypto options modified
May 30 20:34:41 ovpn-client1[11506]: Data Channel: using negotiated cipher 'AES-256-GCM'
May 30 20:34:41 ovpn-client1[11506]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
May 30 20:34:41 ovpn-client1[11506]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
May 30 20:34:41 ovpn-client1[11506]: Preserving previous TUN/TAP instance: tun11
May 30 20:34:41 ovpn-client1[11506]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
May 30 20:34:41 ovpn-client1[11506]: vpnrouting.sh tun11 1500 1585 10.8.1.4 255.255.255.0 init
May 30 20:34:41 openvpn-routing: Configuring policy rules for client 1
May 30 20:34:42 openvpn-routing: Tunnel down - VPN client access blocked
May 30 20:34:42 ovpn-client1[11506]: /sbin/route del -net 64.44.32.115 netmask 255.255.255.255
May 30 20:34:42 ovpn-client1[11506]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
May 30 20:34:42 ovpn-client1[11506]: ERROR: Linux route delete command failed: external program exited with error status: 1
May 30 20:34:42 ovpn-client1[11506]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
May 30 20:34:42 ovpn-client1[11506]: ERROR: Linux route delete command failed: external program exited with error status: 1
May 30 20:34:42 ovpn-client1[11506]: Closing TUN/TAP interface
May 30 20:34:42 ovpn-client1[11506]: /sbin/ifconfig tun11 0.0.0.0
May 30 20:34:42 ovpn-client1[11506]: updown.sh tun11 1500 1585 10.8.1.4 255.255.255.0 init
May 30 20:34:43 rc_service: service 31358:notify_rc updateresolv
May 30 20:34:43 custom_script: Running /jffs/scripts/service-event (args: updateresolv)
May 30 20:34:44 ovpn-client1[11506]: TUN/TAP device tun11 opened
May 30 20:34:44 ovpn-client1[11506]: TUN/TAP TX queue length set to 1000
May 30 20:34:44 ovpn-client1[11506]: /sbin/ifconfig tun11 10.8.0.38 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
May 30 20:34:44 ovpn-client1[11506]: updown.sh tun11 1500 1585 10.8.0.38 255.255.255.0 init
May 30 20:34:46 rc_service: service 31480:notify_rc updateresolv
May 30 20:34:46 custom_script: Running /jffs/scripts/service-event (args: updateresolv)
May 30 20:34:48 ovpn-client1[11506]: /sbin/route add -net 64.44.32.115 netmask 255.255.255.255 gw 88.114.242.1
May 30 20:34:48 ovpn-client1[11506]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
May 30 20:34:48 ovpn-client1[11506]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
May 30 20:34:49 openvpn-routing: Configuring policy rules for client 1
May 30 20:34:49 openvpn-routing: Tunnel re-established, restoring WAN access to clients
May 30 20:34:50 ovpn-client1[11506]: Initialization Sequence Completed
May 30 20:38:11 rc_service: httpds 287:notify_rc stop_vpnclient1
May 30 20:38:11 custom_script: Running /jffs/scripts/service-event (args: stop vpnclient1)
May 30 20:38:11 ovpn-client1[11506]: event_wait : Interrupted system call (code=4)
May 30 20:38:11 ovpn-client1[11506]: SIGTERM received, sending exit notification to peer
May 30 20:38:13 ovpn-client1[11506]: vpnrouting.sh tun11 1500 1585 10.8.0.38 255.255.255.0 init
May 30 20:38:13 openvpn-routing: Configuring policy rules for client 1
May 30 20:38:13 openvpn-routing: Tunnel down - VPN client access blocked
May 30 20:38:13 ovpn-client1[11506]: /sbin/route del -net 64.44.32.115 netmask 255.255.255.255
May 30 20:38:13 ovpn-client1[11506]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
May 30 20:38:13 ovpn-client1[11506]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
May 30 20:38:13 ovpn-client1[11506]: Closing TUN/TAP interface
May 30 20:38:13 ovpn-client1[11506]: /sbin/ifconfig tun11 0.0.0.0
May 30 20:38:13 ovpn-client1[11506]: updown.sh tun11 1500 1585 10.8.0.38 255.255.255.0 init
May 30 20:38:14 rc_service: service 32256:notify_rc updateresolv
May 30 20:38:14 rc_service: waitting "stop_vpnclient1" via httpds ...
May 30 20:38:22 custom_script: Running /jffs/scripts/service-event (args: updateresolv)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.