busolof 0 Posted ... (edited) Hello,look in my router's log and see ip address got from one of your vpn servers.Inside my page on your website called client area since session archive, I see session # 2 who got in touch at 15:08.Created an openvpn config file that I uploaded my router asus rt-ax56u under config generator on your site.Then I check in my router's system log where comes upstats infoExit IPv4: 62.102.148.158tech infoYour VPN IPv4: 10.21.232.103attaches a screenshot of session # 2 But I see in my system log is connected but tested my phone and I see my ISP public ip Is that an bug in openvpn in my router well When add airvpn dns server going my router offline wan ports showing red when take auto dns servers coming my wan port back online could surfing Edited ... by busolof Quote Share this post Link to post
OpenSourcerer 1441 Posted ... Probably a configuration error. Is there a guide you used to set this up? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
busolof 0 Posted ... Hey, Was going after these guide: and tested with another vpn provider same thing has reset router and is something with my asus router. I will send in to there buyed from end of these month Quote Share this post Link to post
OpenSourcerer 1441 Posted ... You're the second one to follow this and experience that something doesn't work. There likely was a change in AsusWRT obsoleting something in the guide. It should be reviewed. For now… huh, don't even know what to advise. Maybe use different keys for all your devices so that each of them can connect to AirVPN? Wouldn't work on something like a console, though. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Staff 10014 Posted ... Hello! We're unsure whether you can if the router reboots, but try anyway to take the system log (where we can also see the OpenVPN log), they are in "Advanced Settings" > "System log" > "General log" (copy all and paste for example). Just in case: also check whether a firmware update is available. If so, apply it and test again. Very old firmware versions did not support 4096 bit keys but Asus fixed it a long ago and Asus customer care specifically tested AirVPN profiles successfully. Another option you could consider if anything else fails is upgrading to Asus MerlinWRT. Kind regards Quote Share this post Link to post
busolof 0 Posted ... (edited) Hello, but before buyed an month from you airvpn tested with another vpn provider fill in an openvpn file upload to my router is an Asus RT-AX56U last firmware have installed is from 2020 01/17. With that another vpn provider they tryed help me in live chat about 4 hours and one helped me reset my router see if helped me not helped. when used yor dns server on wan settings going my wan port red but could coming out on internet very strange but called asus support they will send in my router to there buyed from and will do that late in mars here. Could not use Asus MerlinWrt on my router have no support for that. Here is my system log: Mar 10 09:50:31 rc_service: httpd 17307:notify_rc restart_vpncall Mar 10 09:50:31 vpnclient5[14665]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020 Mar 10 09:50:31 vpnclient5[14665]: library versions: OpenSSL 1.0.2t 10 Sep 2019, LZO 2.03 Mar 10 09:50:31 vpnclient5[14666]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 10 09:50:31 vpnclient5[14666]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 10 09:50:31 vpnclient5[14666]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 10 09:50:31 vpnclient5[14666]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.3.152.99:443 Mar 10 09:50:31 vpnclient5[14666]: Socket Buffers: R=[524288->524288] S=[524288->524288] Mar 10 09:50:31 vpnclient5[14666]: UDP link local: (not bound) Mar 10 09:50:31 vpnclient5[14666]: UDP link remote: [AF_INET]31.3.152.99:443 Mar 10 09:50:31 vpnclient5[14666]: TLS: Initial packet from [AF_INET]31.3.152.99:443, sid=e49190d0 4d86dff0 Mar 10 09:50:31 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 09:50:31 vpnclient5[14666]: VERIFY KU OK Mar 10 09:50:31 vpnclient5[14666]: Validating certificate extended key usage Mar 10 09:50:31 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 09:50:31 vpnclient5[14666]: VERIFY EKU OK Mar 10 09:50:31 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 09:50:33 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 09:50:33 vpnclient5[14666]: [Norma] Peer Connection Initiated with [AF_INET]31.3.152.99:443 Mar 10 09:50:34 vpnclient5[14666]: SENT CONTROL [Norma]: 'PUSH_REQUEST' (status=1) Mar 10 09:50:34 vpnclient5[14666]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.72.1,dhcp-option DNS6 fde6:7a:7d20:1548::1,tun-ipv6,route-gateway 10.25.72.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1548::10ce/64 fde6:7a:7d20:1548::1,ifconfig 10.25.72.208 255.255.255.0,peer-id 13,cipher AES-256-GCM' Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: timers and/or timeouts modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: compression parms modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: --ifconfig/up options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: route options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: route-related options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: peer-id set Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: adjusting link_mtu to 1625 Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: data channel crypto options modified Mar 10 09:50:34 vpnclient5[14666]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 10 09:50:34 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 09:50:34 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 09:50:34 vpnclient5[14666]: GDG6: remote_host_ipv6=n/a Mar 10 09:50:34 vpnclient5[14666]: TUN/TAP device tun15 opened Mar 10 09:50:34 vpnclient5[14666]: TUN/TAP TX queue length set to 100 Mar 10 09:50:34 vpnclient5[14666]: /sbin/ifconfig tun15 10.25.72.208 netmask 255.255.255.0 mtu 1500 broadcast 10.25.72.255 Mar 10 09:50:34 vpnclient5[14666]: /sbin/ifconfig tun15 add fde6:7a:7d20:1548::10ce/64 Mar 10 09:50:34 vpnclient5[14666]: /etc/openvpn/ovpn-up tun15 1500 1553 10.25.72.208 255.255.255.0 init Mar 10 09:50:34 vpnclient5[14666]: Initialization Sequence Completed Mar 10 10:25:28 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 10:50:32 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 10:50:32 vpnclient5[14666]: VERIFY KU OK Mar 10 10:50:32 vpnclient5[14666]: Validating certificate extended key usage Mar 10 10:50:32 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 10:50:32 vpnclient5[14666]: VERIFY EKU OK Mar 10 10:50:32 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 10:50:34 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 10:50:34 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 10:50:34 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 11:40:51 acsd: eth5: selected_chspec is 1003 (3) Mar 10 11:40:51 acsd: eth5: Adjusted channel spec: 0x1003 (3) Mar 10 11:40:51 acsd: eth5: selected channel spec: 0x1003 (3) Mar 10 11:50:32 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 11:50:34 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 11:50:34 vpnclient5[14666]: VERIFY KU OK Mar 10 11:50:34 vpnclient5[14666]: Validating certificate extended key usage Mar 10 11:50:34 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 11:50:34 vpnclient5[14666]: VERIFY EKU OK Mar 10 11:50:34 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 11:50:35 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 11:50:35 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 11:50:35 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 11:55:55 acsd: eth5: selected_chspec is 100a (10) Mar 10 11:55:55 acsd: eth5: Adjusted channel spec: 0x100a (10) Mar 10 11:55:55 acsd: eth5: selected channel spec: 0x100a (10) Mar 10 12:05:02 rc_service: cfg_server 1467:notify_rc restart_time;restart_upnp;restart_usb_idle; Mar 10 11:05:02 kernel: klogd started: BusyBox v1.24.1 (2020-01-14 20:40:17 CST) Mar 10 11:05:02 nat: apply nat rules (/tmp/nat_rules_eth0_eth0) Mar 10 11:05:03 hour monitor: daemon is starting Mar 10 11:05:04 miniupnpd[31146]: version 1.9 started Mar 10 11:05:04 miniupnpd[31146]: HTTP listening on port 36960 Mar 10 11:05:04 miniupnpd[31146]: Listening for NAT-PMP/PCP traffic on port 5351 Mar 10 12:10:59 acsd: eth5: selected_chspec is 1004 (4) Mar 10 12:10:59 acsd: eth5: Adjusted channel spec: 0x1004 (4) Mar 10 12:10:59 acsd: eth5: selected channel spec: 0x1004 (4) Mar 10 12:50:34 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 12:50:35 vpnclient5[14666]: TLS: soft reset sec=0 bytes=30987/-1 pkts=729/0 Mar 10 12:50:35 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 12:50:35 vpnclient5[14666]: VERIFY KU OK Mar 10 12:50:35 vpnclient5[14666]: Validating certificate extended key usage Mar 10 12:50:35 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 12:50:35 vpnclient5[14666]: VERIFY EKU OK Mar 10 12:50:35 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 12:50:37 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 12:50:37 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 12:50:37 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 13:50:35 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 13:50:37 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 13:50:37 vpnclient5[14666]: VERIFY KU OK Mar 10 13:50:37 vpnclient5[14666]: Validating certificate extended key usage Mar 10 13:50:37 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 13:50:37 vpnclient5[14666]: VERIFY EKU OK Mar 10 13:50:37 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 13:50:38 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 13:50:38 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 13:50:38 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 14:11:32 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 14:41:40 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 14:50:36 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 14:50:38 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27868/-1 pkts=706/0 Mar 10 14:50:38 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 14:50:38 vpnclient5[14666]: VERIFY KU OK Mar 10 14:50:38 vpnclient5[14666]: Validating certificate extended key usage Mar 10 14:50:38 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 14:50:38 vpnclient5[14666]: VERIFY EKU OK Mar 10 14:50:38 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 14:50:40 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 14:50:40 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 14:50:40 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 15:41:56 acsd: eth5: selected_chspec is 1009 (9) Mar 10 15:41:56 acsd: eth5: Adjusted channel spec: 0x1009 (9) Mar 10 15:41:56 acsd: eth5: selected channel spec: 0x1009 (9) Mar 10 15:50:38 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 15:50:40 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28320/-1 pkts=710/0 Mar 10 15:50:40 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 15:50:40 vpnclient5[14666]: VERIFY KU OK Mar 10 15:50:40 vpnclient5[14666]: Validating certificate extended key usage Mar 10 15:50:40 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 15:50:40 vpnclient5[14666]: VERIFY EKU OK Mar 10 15:50:40 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 15:50:42 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 15:50:42 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 15:50:42 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 16:27:10 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 16:50:41 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 16:50:42 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 16:50:42 vpnclient5[14666]: VERIFY KU OK Mar 10 16:50:42 vpnclient5[14666]: Validating certificate extended key usage Mar 10 16:50:42 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 16:50:42 vpnclient5[14666]: VERIFY EKU OK Mar 10 16:50:42 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 16:50:43 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 16:50:43 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 16:50:43 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 17:27:25 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 17:42:30 acsd: eth5: selected_chspec is 1008 (8) Mar 10 17:42:30 acsd: eth5: Adjusted channel spec: 0x1008 (8) Mar 10 17:42:30 acsd: eth5: selected channel spec: 0x1008 (8) Mar 10 17:50:42 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 17:50:43 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28035/-1 pkts=707/0 Mar 10 17:50:43 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 17:50:43 vpnclient5[14666]: VERIFY KU OK Mar 10 17:50:43 vpnclient5[14666]: Validating certificate extended key usage Mar 10 17:50:43 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 17:50:43 vpnclient5[14666]: VERIFY EKU OK Mar 10 17:50:43 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 17:50:44 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 17:50:44 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 17:50:44 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 17:57:34 acsd: eth5: selected_chspec is 1009 (9) Mar 10 17:57:34 acsd: eth5: Adjusted channel spec: 0x1009 (9) Mar 10 17:57:34 acsd: eth5: selected channel spec: 0x1009 (9) Mar 10 18:27:42 acsd: eth5: selected_chspec is 1008 (8) Mar 10 18:27:42 acsd: eth5: Adjusted channel spec: 0x1008 (8) Mar 10 18:27:42 acsd: eth5: selected channel spec: 0x1008 (8) Mar 10 18:50:43 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 18:50:44 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28578/-1 pkts=712/0 Mar 10 18:50:44 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 18:50:44 vpnclient5[14666]: VERIFY KU OK Mar 10 18:50:44 vpnclient5[14666]: Validating certificate extended key usage Mar 10 18:50:44 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 18:50:44 vpnclient5[14666]: VERIFY EKU OK Mar 10 18:50:44 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 18:50:45 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 18:50:45 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 18:50:45 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 19:12:53 acsd: eth5: selected_chspec is 100a (10) Mar 10 19:12:53 acsd: eth5: Adjusted channel spec: 0x100a (10) Mar 10 19:12:53 acsd: eth5: selected channel spec: 0x100a (10) Mar 10 19:50:44 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 19:50:45 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 19:50:45 vpnclient5[14666]: VERIFY KU OK Mar 10 19:50:45 vpnclient5[14666]: Validating certificate extended key usage Mar 10 19:50:45 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 19:50:45 vpnclient5[14666]: VERIFY EKU OK Mar 10 19:50:45 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 19:50:47 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 19:50:47 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 19:50:47 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 19:58:06 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 20:43:19 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 20:50:45 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 20:50:47 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28474/-1 pkts=708/0 Mar 10 20:50:47 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 20:50:47 vpnclient5[14666]: VERIFY KU OK Mar 10 20:50:47 vpnclient5[14666]: Validating certificate extended key usage Mar 10 20:50:47 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 20:50:47 vpnclient5[14666]: VERIFY EKU OK Mar 10 20:50:47 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 20:50:49 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 20:50:49 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 20:50:49 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 21:28:31 acsd: eth5: selected_chspec is 1004 (4) Mar 10 21:28:31 acsd: eth5: Adjusted channel spec: 0x1004 (4) Mar 10 21:28:31 acsd: eth5: selected channel spec: 0x1004 (4) Mar 10 21:43:35 acsd: eth5: selected_chspec is 1008 (8) Mar 10 21:43:35 acsd: eth5: Adjusted channel spec: 0x1008 (8) Mar 10 21:43:35 acsd: eth5: selected channel spec: 0x1008 (8) Mar 10 21:50:48 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 21:50:49 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 21:50:49 vpnclient5[14666]: VERIFY KU OK Mar 10 21:50:49 vpnclient5[14666]: Validating certificate extended key usage Mar 10 21:50:49 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 21:50:49 vpnclient5[14666]: VERIFY EKU OK Mar 10 21:50:49 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 21:50:50 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 21:50:50 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 21:50:50 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 21:58:39 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 22:50:49 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 22:50:50 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27533/-1 pkts=703/0 Mar 10 22:50:50 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 22:50:50 vpnclient5[14666]: VERIFY KU OK Mar 10 22:50:50 vpnclient5[14666]: Validating certificate extended key usage Mar 10 22:50:50 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 22:50:50 vpnclient5[14666]: VERIFY EKU OK Mar 10 22:50:50 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 22:50:51 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 22:50:51 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 22:50:51 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 23:22:37 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 10 23:50:50 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 10 23:50:51 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27851/-1 pkts=707/0 Mar 10 23:50:51 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 23:50:51 vpnclient5[14666]: VERIFY KU OK Mar 10 23:50:51 vpnclient5[14666]: Validating certificate extended key usage Mar 10 23:50:51 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 23:50:51 vpnclient5[14666]: VERIFY EKU OK Mar 10 23:50:51 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 23:50:53 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 23:50:53 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 23:50:53 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 00:07:50 acsd: eth5: selected_chspec is 1009 (9) Mar 11 00:07:50 acsd: eth5: Adjusted channel spec: 0x1009 (9) Mar 11 00:07:50 acsd: eth5: selected channel spec: 0x1009 (9) Mar 11 00:22:54 acsd: eth5: selected_chspec is 1008 (8) Mar 11 00:22:54 acsd: eth5: Adjusted channel spec: 0x1008 (8) Mar 11 00:22:54 acsd: eth5: selected channel spec: 0x1008 (8) Mar 11 00:37:58 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 00:50:51 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 00:50:53 vpnclient5[14666]: TLS: soft reset sec=0 bytes=29369/-1 pkts=717/0 Mar 11 00:50:53 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 00:50:53 vpnclient5[14666]: VERIFY KU OK Mar 11 00:50:53 vpnclient5[14666]: Validating certificate extended key usage Mar 11 00:50:53 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 00:50:53 vpnclient5[14666]: VERIFY EKU OK Mar 11 00:50:53 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 00:50:54 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 00:50:54 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 00:50:54 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 00:53:02 acsd: eth5: selected_chspec is 100a (10) Mar 11 00:53:02 acsd: eth5: Adjusted channel spec: 0x100a (10) Mar 11 00:53:02 acsd: eth5: selected channel spec: 0x100a (10) Mar 11 01:50:53 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 01:50:54 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28345/-1 pkts=710/0 Mar 11 01:50:54 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 01:50:54 vpnclient5[14666]: VERIFY KU OK Mar 11 01:50:54 vpnclient5[14666]: Validating certificate extended key usage Mar 11 01:50:54 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 01:50:54 vpnclient5[14666]: VERIFY EKU OK Mar 11 01:50:54 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 01:50:56 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 01:50:56 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 01:50:56 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 02:50:54 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 02:50:56 vpnclient5[14666]: TLS: soft reset sec=0 bytes=30065/-1 pkts=723/0 Mar 11 02:50:56 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 02:50:56 vpnclient5[14666]: VERIFY KU OK Mar 11 02:50:56 vpnclient5[14666]: Validating certificate extended key usage Mar 11 02:50:56 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 02:50:56 vpnclient5[14666]: VERIFY EKU OK Mar 11 02:50:56 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 02:50:57 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 02:50:57 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 02:50:57 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 02:38:00 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6161)]period_retry = 0 Mar 11 02:38:04 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6190)]retrieve firmware information Mar 11 02:38:04 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6206)]no need to upgrade firmware Mar 11 02:38:33 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6161)]period_retry = 1 Mar 11 02:38:37 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6190)]retrieve firmware information Mar 11 02:38:37 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6206)]no need to upgrade firmware Mar 11 02:39:06 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6161)]period_retry = 2 Mar 11 02:39:10 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6190)]retrieve firmware information Mar 11 02:39:10 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6206)]no need to upgrade firmware Mar 11 03:50:57 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28847/-1 pkts=714/0 Mar 11 03:50:57 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 03:50:57 vpnclient5[14666]: VERIFY KU OK Mar 11 03:50:57 vpnclient5[14666]: Validating certificate extended key usage Mar 11 03:50:57 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 03:50:57 vpnclient5[14666]: VERIFY EKU OK Mar 11 03:50:57 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 03:50:58 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 03:50:58 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 03:50:58 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 04:39:04 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 04:50:58 vpnclient5[14666]: TLS: soft reset sec=0 bytes=29329/-1 pkts=717/0 Mar 11 04:50:58 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 04:50:58 vpnclient5[14666]: VERIFY KU OK Mar 11 04:50:58 vpnclient5[14666]: Validating certificate extended key usage Mar 11 04:50:58 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 04:50:58 vpnclient5[14666]: VERIFY EKU OK Mar 11 04:50:58 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 04:50:59 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 04:50:59 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 04:50:59 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 05:50:58 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 05:50:59 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28856/-1 pkts=715/0 Mar 11 05:50:59 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 05:50:59 vpnclient5[14666]: VERIFY KU OK Mar 11 05:50:59 vpnclient5[14666]: Validating certificate extended key usage Mar 11 05:50:59 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 05:50:59 vpnclient5[14666]: VERIFY EKU OK Mar 11 05:50:59 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 05:51:01 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 05:51:01 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 05:51:01 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 06:42:45 aaews[14642]: Tunnel built failed. status code=[370082] Mar 11 06:42:45 aaews[14642]: Tunnel built failed. status code=[477] Mar 11 06:50:59 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 06:51:01 vpnclient5[14666]: TLS: soft reset sec=0 bytes=64661/-1 pkts=987/0 Mar 11 06:51:02 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 06:51:02 vpnclient5[14666]: VERIFY KU OK Mar 11 06:51:02 vpnclient5[14666]: Validating certificate extended key usage Mar 11 06:51:02 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 06:51:02 vpnclient5[14666]: VERIFY EKU OK Mar 11 06:51:02 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 06:51:03 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 06:51:03 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 06:51:03 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 07:51:01 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 07:51:03 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 07:51:03 vpnclient5[14666]: VERIFY KU OK Mar 11 07:51:03 vpnclient5[14666]: Validating certificate extended key usage Mar 11 07:51:03 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 07:51:03 vpnclient5[14666]: VERIFY EKU OK Mar 11 07:51:03 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 07:51:04 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 07:51:04 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 07:51:04 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 08:51:03 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 08:51:04 vpnclient5[14666]: TLS: soft reset sec=0 bytes=31368/-1 pkts=731/0 Mar 11 08:51:04 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 08:51:04 vpnclient5[14666]: VERIFY KU OK Mar 11 08:51:04 vpnclient5[14666]: Validating certificate extended key usage Mar 11 08:51:04 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 08:51:04 vpnclient5[14666]: VERIFY EKU OK Mar 11 08:51:04 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 08:51:05 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 08:51:05 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 08:51:05 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 09:10:22 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 09:40:31 acsd: eth5: selected_chspec is 1008 (8) Mar 11 09:40:31 acsd: eth5: Adjusted channel spec: 0x1008 (8) Mar 11 09:40:31 acsd: eth5: selected channel spec: 0x1008 (8) Mar 11 09:51:05 vpnclient5[14666]: TLS: soft reset sec=0 bytes=29529/-1 pkts=719/0 Mar 11 09:51:05 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 09:51:05 vpnclient5[14666]: VERIFY KU OK Mar 11 09:51:05 vpnclient5[14666]: Validating certificate extended key usage Mar 11 09:51:05 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 09:51:05 vpnclient5[14666]: VERIFY EKU OK Mar 11 09:51:05 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 09:51:06 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 09:51:06 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 09:51:06 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 10:51:05 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 10:51:06 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 10:51:06 vpnclient5[14666]: VERIFY KU OK Mar 11 10:51:06 vpnclient5[14666]: Validating certificate extended key usage Mar 11 10:51:06 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 10:51:06 vpnclient5[14666]: VERIFY EKU OK Mar 11 10:51:06 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 10:51:07 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 10:51:07 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 10:51:07 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 11:46:18 acsd: eth5: selected_chspec is 1004 (4) Mar 11 11:46:18 acsd: eth5: Adjusted channel spec: 0x1004 (4) Mar 11 11:46:18 acsd: eth5: selected channel spec: 0x1004 (4) Mar 11 11:51:05 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 11:51:07 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 11:51:07 vpnclient5[14666]: VERIFY KU OK Mar 11 11:51:07 vpnclient5[14666]: Validating certificate extended key usage Mar 11 11:51:07 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 11:51:07 vpnclient5[14666]: VERIFY EKU OK Mar 11 11:51:07 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 11:51:08 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 11:51:08 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 11:51:08 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 12:51:07 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 12:51:08 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 12:51:08 vpnclient5[14666]: VERIFY KU OK Mar 11 12:51:08 vpnclient5[14666]: Validating certificate extended key usage Mar 11 12:51:08 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 12:51:08 vpnclient5[14666]: VERIFY EKU OK Mar 11 12:51:08 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 12:51:09 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 12:51:09 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 12:51:09 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 13:51:09 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27999/-1 pkts=707/0 Mar 11 13:51:09 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 13:51:09 vpnclient5[14666]: VERIFY KU OK Mar 11 13:51:09 vpnclient5[14666]: Validating certificate extended key usage Mar 11 13:51:09 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 13:51:09 vpnclient5[14666]: VERIFY EKU OK Mar 11 13:51:09 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 13:51:10 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 13:51:10 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 13:51:10 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 14:02:00 acsd: eth5: selected_chspec is 1009 (9) Mar 11 14:02:00 acsd: eth5: Adjusted channel spec: 0x1009 (9) Mar 11 14:02:00 acsd: eth5: selected channel spec: 0x1009 (9) Mar 11 14:09:38 acsd: eth5: selected_chspec is 1003 (3) Mar 11 14:09:38 acsd: eth5: Adjusted channel spec: 0x1003 (3) Mar 11 14:09:38 acsd: eth5: selected channel spec: 0x1003 (3) Mar 11 14:24:41 acsd: eth5: selected_chspec is 1009 (9) Mar 11 14:24:41 acsd: eth5: Adjusted channel spec: 0x1009 (9) Mar 11 14:24:41 acsd: eth5: selected channel spec: 0x1009 (9) Mar 11 14:51:09 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 14:51:10 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28055/-1 pkts=706/0 Mar 11 14:51:10 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 14:51:10 vpnclient5[14666]: VERIFY KU OK Mar 11 14:51:10 vpnclient5[14666]: Validating certificate extended key usage Mar 11 14:51:10 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 14:51:10 vpnclient5[14666]: VERIFY EKU OK Mar 11 14:51:10 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 14:51:11 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 14:51:11 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 14:51:11 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 15:40:02 acsd: eth5: selected_chspec is 100a (10) Mar 11 15:40:02 acsd: eth5: Adjusted channel spec: 0x100a (10) Mar 11 15:40:02 acsd: eth5: selected channel spec: 0x100a (10) Mar 11 15:51:10 vpnclient5[14666]: TLS: tls_process: killed expiring key Mar 11 15:51:11 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28556/-1 pkts=708/0 Mar 11 15:51:11 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 15:51:11 vpnclient5[14666]: VERIFY KU OK Mar 11 15:51:11 vpnclient5[14666]: Validating certificate extended key usage Mar 11 15:51:11 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 15:51:11 vpnclient5[14666]: VERIFY EKU OK Mar 11 15:51:11 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 11 15:51:12 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:51:12 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:51:12 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 15:08:34 rc_service: httpd 17307:notify_rc restart_vpncall Mar 11 15:08:37 rc_service: httpd 17307:notify_rc restart_vpncall Mar 11 15:08:37 rc_service: waitting "restart_vpncall" via httpd ... Mar 11 16:08:37 vpnclient5[14666]: event_wait : Interrupted system call (code=4) Mar 11 16:08:37 vpnclient5[14666]: SIGTERM received, sending exit notification to peer Mar 11 16:08:42 vpnclient5[14666]: Closing TUN/TAP interface Mar 11 16:08:42 vpnclient5[14666]: /sbin/ifconfig tun15 0.0.0.0 Mar 11 16:08:42 vpnclient5[14666]: /sbin/ifconfig tun15 del fde6:7a:7d20:1548::10ce/64 Mar 11 16:08:42 vpnclient5[14666]: /etc/openvpn/ovpn-down tun15 1500 1553 10.25.72.208 255.255.255.0 init Mar 11 16:08:42 vpnclient5[14666]: SIGTERM[soft,exit-with-notification] received, process exiting Mar 11 15:08:45 rc_service: httpd 17307:notify_rc restart_vpncall Mar 11 15:08:45 vpnclient5[9730]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020 Mar 11 15:08:45 vpnclient5[9730]: library versions: OpenSSL 1.0.2t 10 Sep 2019, LZO 2.03 Mar 11 15:08:45 vpnclient5[9731]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 11 15:08:45 vpnclient5[9731]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 11 15:08:45 vpnclient5[9731]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 11 15:08:45 vpnclient5[9731]: TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.143:443 Mar 11 15:08:45 vpnclient5[9731]: Socket Buffers: R=[524288->524288] S=[524288->524288] Mar 11 15:08:45 vpnclient5[9731]: UDP link local: (not bound) Mar 11 15:08:45 vpnclient5[9731]: UDP link remote: [AF_INET]62.102.148.143:443 Mar 11 15:08:45 vpnclient5[9731]: TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=ecb21bb6 7cdfb56e Mar 11 15:08:45 vpnclient5[9731]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 15:08:45 vpnclient5[9731]: VERIFY KU OK Mar 11 15:08:45 vpnclient5[9731]: Validating certificate extended key usage Mar 11 15:08:45 vpnclient5[9731]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 15:08:45 vpnclient5[9731]: VERIFY EKU OK Mar 11 15:08:45 vpnclient5[9731]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 15:08:46 vpnclient5[9731]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 15:08:46 vpnclient5[9731]: [Menkab] Peer Connection Initiated with [AF_INET]62.102.148.143:443 Mar 11 15:08:48 vpnclient5[9731]: SENT CONTROL [Menkab]: 'PUSH_REQUEST' (status=1) Mar 11 15:08:48 vpnclient5[9731]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.232.1,dhcp-option DNS6 fde6:7a:7d20:11e8::1,tun-ipv6,route-gateway 10.21.232.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11e8::1065/64 fde6:7a:7d20:11e8::1,ifconfig 10.21.232.103 255.255.255.0,peer-id 2,cipher AES-256-GCM' Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: timers and/or timeouts modified Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: compression parms modified Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: --ifconfig/up options modified Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: route options modified Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: route-related options modified Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: peer-id set Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: adjusting link_mtu to 1625 Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: data channel crypto options modified Mar 11 15:08:48 vpnclient5[9731]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 11 15:08:48 vpnclient5[9731]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:08:48 vpnclient5[9731]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:08:48 vpnclient5[9731]: GDG6: remote_host_ipv6=n/a Mar 11 15:08:48 vpnclient5[9731]: TUN/TAP device tun15 opened Mar 11 15:08:48 vpnclient5[9731]: TUN/TAP TX queue length set to 100 Mar 11 15:08:48 vpnclient5[9731]: /sbin/ifconfig tun15 10.21.232.103 netmask 255.255.255.0 mtu 1500 broadcast 10.21.232.255 Mar 11 15:08:48 vpnclient5[9731]: /sbin/ifconfig tun15 add fde6:7a:7d20:11e8::1065/64 Mar 11 15:08:48 vpnclient5[9731]: /etc/openvpn/ovpn-up tun15 1500 1553 10.21.232.103 255.255.255.0 init Mar 11 15:08:53 vpnclient5[9731]: Initialization Sequence Completed Mar 11 16:25:14 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 15:51:00 rc_service: httpd 17307:notify_rc restart_wan_if 0 Mar 11 15:51:00 vpnclient5[9731]: event_wait : Interrupted system call (code=4) Mar 11 15:51:00 vpnclient5[9731]: SIGTERM received, sending exit notification to peer Mar 11 15:51:05 vpnclient5[9731]: Closing TUN/TAP interface Mar 11 15:51:05 vpnclient5[9731]: /sbin/ifconfig tun15 0.0.0.0 Mar 11 15:51:05 vpnclient5[9731]: /sbin/ifconfig tun15 del fde6:7a:7d20:11e8::1065/64 Mar 11 15:51:05 vpnclient5[9731]: /etc/openvpn/ovpn-down tun15 1500 1553 10.21.232.103 255.255.255.0 init Mar 11 15:51:05 vpnclient5[9731]: SIGTERM[soft,exit-with-notification] received, process exiting Mar 11 15:51:11 nat: apply nat rules (/tmp/nat_rules_eth0_eth0) Mar 11 15:51:11 wan: finish adding multi routes Mar 11 15:51:12 miniupnpd[31146]: shutting down MiniUPnPd Mar 11 15:51:12 miniupnpd[14462]: version 1.9 started Mar 11 15:51:12 miniupnpd[14462]: HTTP listening on port 38143 Mar 11 15:51:12 miniupnpd[14462]: Listening for NAT-PMP/PCP traffic on port 5351 Mar 11 15:51:12 vpnclient5[14476]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020 Mar 11 15:51:12 vpnclient5[14476]: library versions: OpenSSL 1.0.2t 10 Sep 2019, LZO 2.03 Mar 11 15:51:12 vpnclient5[14482]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 11 15:51:12 vpnclient5[14482]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 11 15:51:12 vpnclient5[14482]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 11 15:51:12 vpnclient5[14482]: TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.143:443 Mar 11 15:51:12 vpnclient5[14482]: Socket Buffers: R=[524288->524288] S=[524288->524288] Mar 11 15:51:12 vpnclient5[14482]: UDP link local: (not bound) Mar 11 15:51:12 vpnclient5[14482]: UDP link remote: [AF_INET]62.102.148.143:443 Mar 11 15:51:12 vpnclient5[14482]: TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=7626ef1d 6f8663d4 Mar 11 15:51:12 vpnclient5[14482]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 15:51:12 vpnclient5[14482]: VERIFY KU OK Mar 11 15:51:12 vpnclient5[14482]: Validating certificate extended key usage Mar 11 15:51:12 vpnclient5[14482]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 15:51:12 vpnclient5[14482]: VERIFY EKU OK Mar 11 15:51:12 vpnclient5[14482]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 15:51:13 vpnclient5[14482]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 15:51:13 vpnclient5[14482]: [Menkab] Peer Connection Initiated with [AF_INET]62.102.148.143:443 Mar 11 15:51:14 vpnclient5[14482]: SENT CONTROL [Menkab]: 'PUSH_REQUEST' (status=1) Mar 11 15:51:14 vpnclient5[14482]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.232.1,dhcp-option DNS6 fde6:7a:7d20:11e8::1,tun-ipv6,route-gateway 10.21.232.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11e8::1065/64 fde6:7a:7d20:11e8::1,ifconfig 10.21.232.103 255.255.255.0,peer-id 2,cipher AES-256-GCM' Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: timers and/or timeouts modified Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: compression parms modified Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: --ifconfig/up options modified Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: route options modified Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: route-related options modified Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: peer-id set Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: adjusting link_mtu to 1625 Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: data channel crypto options modified Mar 11 15:51:14 vpnclient5[14482]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 11 15:51:14 vpnclient5[14482]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:51:14 vpnclient5[14482]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:51:14 vpnclient5[14482]: GDG6: remote_host_ipv6=n/a Mar 11 15:51:14 vpnclient5[14482]: TUN/TAP device tun15 opened Mar 11 15:51:14 vpnclient5[14482]: TUN/TAP TX queue length set to 100 Mar 11 15:51:14 vpnclient5[14482]: /sbin/ifconfig tun15 10.21.232.103 netmask 255.255.255.0 mtu 1500 broadcast 10.21.232.255 Mar 11 15:51:14 vpnclient5[14482]: /sbin/ifconfig tun15 add fde6:7a:7d20:11e8::1065/64 Mar 11 15:51:14 vpnclient5[14482]: /etc/openvpn/ovpn-up tun15 1500 1553 10.21.232.103 255.255.255.0 init Mar 11 15:51:19 kernel: The For ALL DEVICES flag of Prof 1 has been set to ENABLE Mar 11 15:51:19 BWDPI: fun bitmap = 4bf Mar 11 15:51:19 A.QoS: qos_count=0, qos_check=0 Mar 11 15:51:20 vpnclient5[14482]: Initialization Sequence Completed Mar 11 15:51:23 A.QoS: qos rule is less than 22 Mar 11 15:51:23 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:51:24 A.QoS: qos_count=0, qos_check=1 Mar 11 15:51:28 A.QoS: qos rule is less than 22 Mar 11 15:51:28 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:51:29 A.QoS: qos_count=1, qos_check=1 Mar 11 15:51:33 A.QoS: qos rule is less than 22 Mar 11 15:51:33 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:51:34 A.QoS: qos_count=2, qos_check=1 Mar 11 15:51:38 A.QoS: qos rule is less than 22 Mar 11 15:51:38 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:51:38 nat: apply nat rules (/tmp/nat_rules_eth0_eth0) Mar 11 15:51:38 kernel: Archer TCP Pure ACK Enabled Mar 11 15:51:38 dhcp client: bound 94.137.98.202/255.255.255.192 via 94.137.98.193 for 86400 seconds. Mar 11 15:53:22 rc_service: httpd 17307:notify_rc restart_wan_if 0 Mar 11 15:53:22 vpnclient5[14482]: event_wait : Interrupted system call (code=4) Mar 11 15:53:22 vpnclient5[14482]: SIGTERM received, sending exit notification to peer Mar 11 15:53:27 vpnclient5[14482]: Closing TUN/TAP interface Mar 11 15:53:27 vpnclient5[14482]: /sbin/ifconfig tun15 0.0.0.0 Mar 11 15:53:27 vpnclient5[14482]: /sbin/ifconfig tun15 del fde6:7a:7d20:11e8::1065/64 Mar 11 15:53:27 vpnclient5[14482]: /etc/openvpn/ovpn-down tun15 1500 1553 10.21.232.103 255.255.255.0 init Mar 11 15:53:27 vpnclient5[14482]: SIGTERM[soft,exit-with-notification] received, process exiting Mar 11 15:53:34 nat: apply nat rules (/tmp/nat_rules_eth0_eth0) Mar 11 15:53:35 wan: finish adding multi routes Mar 11 15:53:36 miniupnpd[14462]: shutting down MiniUPnPd Mar 11 15:53:36 miniupnpd[16565]: version 1.9 started Mar 11 15:53:36 miniupnpd[16565]: HTTP listening on port 50768 Mar 11 15:53:36 miniupnpd[16565]: Listening for NAT-PMP/PCP traffic on port 5351 Mar 11 15:53:36 vpnclient5[16590]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020 Mar 11 15:53:36 vpnclient5[16590]: library versions: OpenSSL 1.0.2t 10 Sep 2019, LZO 2.03 Mar 11 15:53:36 vpnclient5[16591]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 11 15:53:36 vpnclient5[16591]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 11 15:53:36 vpnclient5[16591]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 11 15:53:36 vpnclient5[16591]: TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.143:443 Mar 11 15:53:36 vpnclient5[16591]: Socket Buffers: R=[524288->524288] S=[524288->524288] Mar 11 15:53:36 vpnclient5[16591]: UDP link local: (not bound) Mar 11 15:53:36 vpnclient5[16591]: UDP link remote: [AF_INET]62.102.148.143:443 Mar 11 15:53:36 vpnclient5[16591]: TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=9221ae8d 03708efa Mar 11 15:53:36 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 15:53:36 vpnclient5[16591]: VERIFY KU OK Mar 11 15:53:36 vpnclient5[16591]: Validating certificate extended key usage Mar 11 15:53:36 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 15:53:36 vpnclient5[16591]: VERIFY EKU OK Mar 11 15:53:36 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 15:53:38 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 15:53:38 vpnclient5[16591]: [Menkab] Peer Connection Initiated with [AF_INET]62.102.148.143:443 Mar 11 15:53:39 vpnclient5[16591]: SENT CONTROL [Menkab]: 'PUSH_REQUEST' (status=1) Mar 11 15:53:39 vpnclient5[16591]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.232.1,dhcp-option DNS6 fde6:7a:7d20:11e8::1,tun-ipv6,route-gateway 10.21.232.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11e8::1065/64 fde6:7a:7d20:11e8::1,ifconfig 10.21.232.103 255.255.255.0,peer-id 2,cipher AES-256-GCM' Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: timers and/or timeouts modified Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: compression parms modified Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: --ifconfig/up options modified Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: route options modified Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: route-related options modified Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: peer-id set Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: adjusting link_mtu to 1625 Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: data channel crypto options modified Mar 11 15:53:39 vpnclient5[16591]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 11 15:53:39 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:53:39 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 15:53:39 vpnclient5[16591]: GDG6: remote_host_ipv6=n/a Mar 11 15:53:39 vpnclient5[16591]: TUN/TAP device tun15 opened Mar 11 15:53:39 vpnclient5[16591]: TUN/TAP TX queue length set to 100 Mar 11 15:53:39 vpnclient5[16591]: /sbin/ifconfig tun15 10.21.232.103 netmask 255.255.255.0 mtu 1500 broadcast 10.21.232.255 Mar 11 15:53:39 vpnclient5[16591]: /sbin/ifconfig tun15 add fde6:7a:7d20:11e8::1065/64 Mar 11 15:53:39 vpnclient5[16591]: /etc/openvpn/ovpn-up tun15 1500 1553 10.21.232.103 255.255.255.0 init Mar 11 15:53:44 kernel: The For ALL DEVICES flag of Prof 1 has been set to ENABLE Mar 11 15:53:44 BWDPI: fun bitmap = 4bf Mar 11 15:53:44 A.QoS: qos_count=0, qos_check=0 Mar 11 15:53:44 vpnclient5[16591]: Initialization Sequence Completed Mar 11 15:53:47 A.QoS: qos rule is less than 22 Mar 11 15:53:47 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:53:49 A.QoS: qos_count=0, qos_check=1 Mar 11 15:53:52 A.QoS: qos rule is less than 22 Mar 11 15:53:52 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:53:54 A.QoS: qos_count=1, qos_check=1 Mar 11 15:53:57 A.QoS: qos rule is less than 22 Mar 11 15:53:57 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:53:59 A.QoS: qos_count=2, qos_check=1 Mar 11 15:54:02 A.QoS: qos rule is less than 22 Mar 11 15:54:02 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail Mar 11 15:54:02 nat: apply nat rules (/tmp/nat_rules_eth0_eth0) Mar 11 15:54:02 kernel: Archer TCP Pure ACK Enabled Mar 11 15:54:02 dhcp client: bound 94.137.98.202/255.255.255.192 via 94.137.98.193 for 86400 seconds. Mar 11 16:55:23 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 16:53:37 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 16:53:37 vpnclient5[16591]: VERIFY KU OK Mar 11 16:53:37 vpnclient5[16591]: Validating certificate extended key usage Mar 11 16:53:37 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 16:53:37 vpnclient5[16591]: VERIFY EKU OK Mar 11 16:53:37 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 16:53:39 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 16:53:39 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 16:53:39 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 17:55:39 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 18:25:47 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 18:40:51 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 17:53:37 vpnclient5[16591]: TLS: tls_process: killed expiring key Mar 11 17:53:38 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 17:53:38 vpnclient5[16591]: VERIFY KU OK Mar 11 17:53:38 vpnclient5[16591]: Validating certificate extended key usage Mar 11 17:53:38 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 17:53:38 vpnclient5[16591]: VERIFY EKU OK Mar 11 17:53:38 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 17:53:40 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 17:53:40 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 17:53:40 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 18:55:55 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 19:41:08 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 18:53:38 vpnclient5[16591]: TLS: tls_process: killed expiring key Mar 11 18:53:40 vpnclient5[16591]: TLS: soft reset sec=0 bytes=29595/-1 pkts=712/0 Mar 11 18:53:40 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 18:53:40 vpnclient5[16591]: VERIFY KU OK Mar 11 18:53:40 vpnclient5[16591]: Validating certificate extended key usage Mar 11 18:53:40 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 18:53:40 vpnclient5[16591]: VERIFY EKU OK Mar 11 18:53:40 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 18:53:42 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 18:53:42 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 18:53:42 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 19:56:11 acsd: eth5: selected_chspec is 1009 (9) Mar 11 19:56:11 acsd: eth5: Adjusted channel spec: 0x1009 (9) Mar 11 19:56:11 acsd: eth5: selected channel spec: 0x1009 (9) Mar 11 19:53:40 vpnclient5[16591]: TLS: tls_process: killed expiring key Mar 11 19:53:42 vpnclient5[16591]: TLS: soft reset sec=0 bytes=28929/-1 pkts=716/0 Mar 11 19:53:42 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 19:53:42 vpnclient5[16591]: VERIFY KU OK Mar 11 19:53:42 vpnclient5[16591]: Validating certificate extended key usage Mar 11 19:53:42 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 19:53:42 vpnclient5[16591]: VERIFY EKU OK Mar 11 19:53:42 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 19:53:44 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 19:53:44 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 19:53:44 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 20:56:30 acsd: eth5: staying in current channel as txop is recovered with in time limit Mar 11 20:53:42 vpnclient5[16591]: TLS: tls_process: killed expiring key Mar 11 20:53:44 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 11 20:53:44 vpnclient5[16591]: VERIFY KU OK Mar 11 20:53:44 vpnclient5[16591]: Validating certificate extended key usage Mar 11 20:53:44 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 11 20:53:44 vpnclient5[16591]: VERIFY EKU OK Mar 11 20:53:44 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org Mar 11 20:53:45 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 20:53:45 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 11 20:53:45 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 11 22:11:52 acsd: eth5: staying in current channel as txop is recovered with in time limit but is going to session have two see picture OS TYP linux that my router there is an connecting. runing now windows 10 app from you. but will change to another router later in mars here and hope going better with that router of course. Kind Regards Bengt Edited ... by giganerd Apply LOG formatting to logs Quote Share this post Link to post
Staff 10014 Posted ... Hello!@busolof Actually according to the log OpenVPN connected successfully and remained connected for several hours. Since Asus offered to replace the device, then something wrong that's specific to your own one might be the problem. Even the fact that you say that you can't upgrade to Asus Merlin is unusual. In AsusWRT routers, upgrading to Merlin is a matter of a few clicks, literally. https://blog.usro.net/how-to-install-asus-wrt-merlin-router-firmware/ We're confident that the router replacement will solve any issue. Or maybe the AX56U has some problem that makes its behavior inconsistent with the AC56U and AC68U (which is an AsusWRT router we own and which we based our tests on).@giganerd Reviewed the guide for AsusWRT and it is up to date. Kind regards 1 OpenSourcerer reacted to this Quote Share this post Link to post
busolof 0 Posted ... Hello, yes OpenVPN have connecting to your vpn server but something wrong on my router not showing outside of my network. Think is an bug in OpenVpn on my Asus router for erything is working perfect in my home. Will have wait see if coming an patch before end of Mars perhaps fix my problem hope that. But will buy another router Asus RT-AX92U or Netgear Nigthhawk x10 think that Netgear can install customs firmware.meanwhile will run your windows 10 app until fixed or provided another router where vpn will work 100% Kind Regards Bengt Quote Share this post Link to post
busolof 0 Posted ... Hello, was an beta for my router from asus merlin but not working for me tryed 3 times think will wait an stable version Quote Share this post Link to post
SurprisedItWorks 49 Posted ... If you decide to start over with a new router, look at a Netgear R7800 with dd-wrt and AirVPN. (The R7800 has by far the best dd-wrt support.) The relevant guides:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=321856 1 db-001 reacted to this Quote Share this post Link to post
busolof 0 Posted ... But use Asus RT-AX56U think is an bug in openvpn client but found on https://www.asuswrt-merlin.net/ tested that beta says is connecting But will buy an netgear r9000 and is no problem with that routers what iknow Will try fix my asus router first Quote Share this post Link to post
busolof 0 Posted ... Hello, I got that openvpn working now, was do harware reset before installed an beta of asus merling for my router asus rt-ax56u but my wan port showing red ligth nut can surfing on internet Quote Share this post Link to post
busolof 0 Posted ... Hey, tryed change another vpn server then will that not working tryed get that working again not luck think is something wrong on my router Quote Share this post Link to post
go558a83nk 364 Posted ... 19 hours ago, busolof said: But use Asus RT-AX56U think is an bug in openvpn client but found on https://www.asuswrt-merlin.net/ tested that beta says is connecting But will buy an netgear r9000 and is no problem with that routers what iknow Will try fix my asus router first Have you tried to get help in the Merlin Asus forum? There's a thread specifically for the new build that supports your router.https://www.snbforums.com/threads/beta-asuswrt-merlin-384-16-beta-and-384-13_5-are-available.62699/ Quote Share this post Link to post
busolof 0 Posted ... 15 minutes ago, go558a83nk said: Have you tried to get help in the Merlin Asus forum? There's a thread specifically for the new build that supports your router.https://www.snbforums.com/threads/beta-asuswrt-merlin-384-16-beta-and-384-13_5-are-available.62699/ yes but they will not answer me have another great problem: Mar 21 15:08:51 wlceventd: wlceventd_proc_event(527): eth6: Assoc E8:4E:06:51:FB:73, status: Successful (0) Mar 21 15:08:51 kernel: CFG80211-ERROR) wl_cfg80211_change_station : WLC_SCB_AUTHORIZE sta_flags_mask not set Mar 21 15:08:52 hostapd: eth6: STA e8:4e:06:51:fb:73 RADIUS: starting accounting session 58AC8DE53E86D160 Mar 21 15:08:52 hostapd: eth6: STA e8:4e:06:51:fb:73 WPA: pairwise key handshake completed (RSN) Mar 21 15:08:52 dnsmasq-dhcp[1304]: DHCPREQUEST(br0) 192.168.50.192 e8:4e:06:51:fb:73 Mar 21 15:08:52 dnsmasq-dhcp[1304]: Ignoring domain olssondata.intranet for DHCP host name hpwin10pro Mar 21 15:08:52 dnsmasq-dhcp[1304]: DHCPACK(br0) 192.168.50.192 e8:4e:06:51:fb:73 hpwin10pro Mar 21 15:09:26 wlceventd: wlceventd_proc_event(464): eth6: Deauth_ind E8:4E:06:51:FB:73, status: 0, reason: Disassociated due to inactivity (4) Mar 21 15:09:26 hostapd: eth6: STA e8:4e:06:51:fb:73 IEEE 802.11: disassociated has no problem before not understand why my laptop is blocked now Quote Share this post Link to post
busolof 0 Posted ... and flashed back to asus firmware then working my laptop again must be an bug not understand tryed everything Quote Share this post Link to post
busolof 0 Posted ... never give up tryed again now working that was in ovpn file change no to ipv6. Will run on that now Quote Share this post Link to post