Jump to content
Not connected, Your IP: 35.175.191.168
Sign in to follow this  
Littlemexican

VPN on router disconnect automatically

Recommended Posts

Hello Air,

 

I have a Asus RT-ac3200 with merlin 378.55 and my VPN dissconnect automatiiclly more times a day sometimes my  router resets itself.

 

This is what I found in the log:

Aug  8 12:15:39 miniupnpd[770]: upnp_event_recv: recv(): Connection reset by peer
Aug  8 12:15:45 openvpn[806]: [server] Inactivity timeout (--ping-restart), restarting
Aug  8 12:15:45 openvpn[806]: SIGUSR1[soft,ping-restart] received, process restarting
Aug  8 12:15:45 openvpn[806]: Restart pause, 2 second(s)
Aug  8 12:15:47 openvpn[806]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Aug  8 12:15:47 openvpn[806]: Socket Buffers: R=[122880->131072] S=[122880->131072]
Aug  8 12:15:47 openvpn[806]: UDPv4 link local: [undef]
Aug  8 12:15:47 openvpn[806]: UDPv4 link remote: [AF_INET]213.152.161.116:443
Aug  8 12:15:51 openvpn[806]: TLS: Initial packet from [AF_INET]213.152.161.116:443, sid=070571b4 0697e8f5
Aug  8 12:15:51 openvpn[806]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Aug  8 12:15:51 openvpn[806]: Validating certificate key usage
Aug  8 12:15:51 openvpn[806]: ++ Certificate has key usage  00a0, expects 00a0
Aug  8 12:15:51 openvpn[806]: VERIFY KU OK
Aug  8 12:15:51 openvpn[806]: Validating certificate extended key usage
Aug  8 12:15:51 openvpn[806]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Aug  8 12:15:51 openvpn[806]: VERIFY EKU OK
Aug  8 12:15:51 openvpn[806]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Aug  8 12:15:53 openvpn[806]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Aug  8 12:15:53 openvpn[806]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Aug  8 12:15:53 openvpn[806]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Aug  8 12:15:53 openvpn[806]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Aug  8 12:15:53 openvpn[806]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

 

Does somone know what this means and how I can FIx this? I already tried different servers, resetting my router but that will not solve the problem. Any help is welcome!

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...