Jump to content
Not connected, Your IP: 3.234.244.18
busolof

problem with openvpn in my router!!!

Recommended Posts

Posted ... (edited)
Hello,
look in my router's log and see ip address got from one of your vpn servers.
Inside my page on your website called client area since session archive, I see session # 2 who got in touch at 15:08.
Created an openvpn config file that I uploaded my router asus rt-ax56u under config generator on your site.
Then I check in my router's system log where comes up
stats info
Exit IPv4: 62.102.148.158
tech info
Your VPN IPv4: 10.21.232.103
attaches a screenshot of session # 2

But I see in my system log is connected but tested my phone and I see my ISP public ip
Is that an bug in openvpn in my router well
When add airvpn dns server going my router offline wan ports showing red when take auto dns servers coming my wan port back online could surfing

airvpn_asus.jpg

Edited ... by busolof

Share this post


Link to post

Probably a configuration error. Is there a guide you used to set this up?


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Hey,
Was going after these guide:
and tested with another vpn provider same thing has reset router and is something with my asus router.
I will send in to there buyed from end of these month

Share this post


Link to post

You're the second one to follow this and experience that something doesn't work. There likely was a change in AsusWRT obsoleting something in the guide. It should be reviewed.
For now… huh, don't even know what to advise. Maybe use different keys for all your devices so that each of them can connect to AirVPN? Wouldn't work on something like a console, though.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Hello!

We're unsure whether you can if the router reboots, but try anyway to take the system log (where we can also see the OpenVPN log), they are in "Advanced Settings" > "System log" > "General log" (copy all and paste for example).

Just in case: also check whether a firmware update is available. If so, apply it and test again. Very old firmware versions did not support 4096 bit keys but Asus fixed it a long ago and Asus customer care specifically tested AirVPN profiles successfully.

Another option you could consider if anything else fails is upgrading to Asus MerlinWRT.

Kind regards
 

Share this post


Link to post
Posted ... (edited)

Hello,
but before buyed an month from you airvpn tested with another vpn provider fill in an openvpn file upload to my router is an Asus RT-AX56U last firmware have installed is from 2020 01/17.
With that another vpn provider they tryed help me in live chat about 4 hours and one helped me reset my router see if helped me not helped.
when used yor dns server on wan settings going my wan port red but could coming out on internet very strange but called asus support they will send in my router to there buyed from and will do that late in mars here.
Could not use Asus MerlinWrt on my router have no support for that.
Here is my system log:

Mar 10 09:50:31 rc_service: httpd 17307:notify_rc restart_vpncall
Mar 10 09:50:31 vpnclient5[14665]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020
Mar 10 09:50:31 vpnclient5[14665]: library versions: OpenSSL 1.0.2t  10 Sep 2019, LZO 2.03
Mar 10 09:50:31 vpnclient5[14666]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 10 09:50:31 vpnclient5[14666]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 10 09:50:31 vpnclient5[14666]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 10 09:50:31 vpnclient5[14666]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.3.152.99:443
Mar 10 09:50:31 vpnclient5[14666]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Mar 10 09:50:31 vpnclient5[14666]: UDP link local: (not bound)
Mar 10 09:50:31 vpnclient5[14666]: UDP link remote: [AF_INET]31.3.152.99:443
Mar 10 09:50:31 vpnclient5[14666]: TLS: Initial packet from [AF_INET]31.3.152.99:443, sid=e49190d0 4d86dff0
Mar 10 09:50:31 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 09:50:31 vpnclient5[14666]: VERIFY KU OK
Mar 10 09:50:31 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 09:50:31 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 09:50:31 vpnclient5[14666]: VERIFY EKU OK
Mar 10 09:50:31 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 09:50:33 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 09:50:33 vpnclient5[14666]: [Norma] Peer Connection Initiated with [AF_INET]31.3.152.99:443
Mar 10 09:50:34 vpnclient5[14666]: SENT CONTROL [Norma]: 'PUSH_REQUEST' (status=1)
Mar 10 09:50:34 vpnclient5[14666]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.72.1,dhcp-option DNS6 fde6:7a:7d20:1548::1,tun-ipv6,route-gateway 10.25.72.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1548::10ce/64 fde6:7a:7d20:1548::1,ifconfig 10.25.72.208 255.255.255.0,peer-id 13,cipher AES-256-GCM'
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: timers and/or timeouts modified
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: compression parms modified
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: --ifconfig/up options modified
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: route options modified
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: route-related options modified
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: peer-id set
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: adjusting link_mtu to 1625
Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: data channel crypto options modified
Mar 10 09:50:34 vpnclient5[14666]: Data Channel: using negotiated cipher 'AES-256-GCM'
Mar 10 09:50:34 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 09:50:34 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 09:50:34 vpnclient5[14666]: GDG6: remote_host_ipv6=n/a
Mar 10 09:50:34 vpnclient5[14666]: TUN/TAP device tun15 opened
Mar 10 09:50:34 vpnclient5[14666]: TUN/TAP TX queue length set to 100
Mar 10 09:50:34 vpnclient5[14666]: /sbin/ifconfig tun15 10.25.72.208 netmask 255.255.255.0 mtu 1500 broadcast 10.25.72.255
Mar 10 09:50:34 vpnclient5[14666]: /sbin/ifconfig tun15 add fde6:7a:7d20:1548::10ce/64
Mar 10 09:50:34 vpnclient5[14666]: /etc/openvpn/ovpn-up tun15 1500 1553 10.25.72.208 255.255.255.0 init
Mar 10 09:50:34 vpnclient5[14666]: Initialization Sequence Completed
Mar 10 10:25:28 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 10:50:32 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 10:50:32 vpnclient5[14666]: VERIFY KU OK
Mar 10 10:50:32 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 10:50:32 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 10:50:32 vpnclient5[14666]: VERIFY EKU OK
Mar 10 10:50:32 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 10:50:34 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 10:50:34 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 10:50:34 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 11:40:51 acsd: eth5: selected_chspec is 1003 (3)
Mar 10 11:40:51 acsd: eth5: Adjusted channel spec: 0x1003 (3)
Mar 10 11:40:51 acsd: eth5: selected channel spec: 0x1003 (3)
Mar 10 11:50:32 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 11:50:34 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 11:50:34 vpnclient5[14666]: VERIFY KU OK
Mar 10 11:50:34 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 11:50:34 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 11:50:34 vpnclient5[14666]: VERIFY EKU OK
Mar 10 11:50:34 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 11:50:35 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 11:50:35 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 11:50:35 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 11:55:55 acsd: eth5: selected_chspec is 100a (10)
Mar 10 11:55:55 acsd: eth5: Adjusted channel spec: 0x100a (10)
Mar 10 11:55:55 acsd: eth5: selected channel spec: 0x100a (10)
Mar 10 12:05:02 rc_service: cfg_server 1467:notify_rc restart_time;restart_upnp;restart_usb_idle;
Mar 10 11:05:02 kernel: klogd started: BusyBox v1.24.1 (2020-01-14 20:40:17 CST)
Mar 10 11:05:02 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
Mar 10 11:05:03 hour monitor: daemon is starting
Mar 10 11:05:04 miniupnpd[31146]: version 1.9 started
Mar 10 11:05:04 miniupnpd[31146]: HTTP listening on port 36960
Mar 10 11:05:04 miniupnpd[31146]: Listening for NAT-PMP/PCP traffic on port 5351
Mar 10 12:10:59 acsd: eth5: selected_chspec is 1004 (4)
Mar 10 12:10:59 acsd: eth5: Adjusted channel spec: 0x1004 (4)
Mar 10 12:10:59 acsd: eth5: selected channel spec: 0x1004 (4)
Mar 10 12:50:34 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 12:50:35 vpnclient5[14666]: TLS: soft reset sec=0 bytes=30987/-1 pkts=729/0
Mar 10 12:50:35 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 12:50:35 vpnclient5[14666]: VERIFY KU OK
Mar 10 12:50:35 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 12:50:35 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 12:50:35 vpnclient5[14666]: VERIFY EKU OK
Mar 10 12:50:35 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 12:50:37 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 12:50:37 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 12:50:37 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 13:50:35 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 13:50:37 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 13:50:37 vpnclient5[14666]: VERIFY KU OK
Mar 10 13:50:37 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 13:50:37 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 13:50:37 vpnclient5[14666]: VERIFY EKU OK
Mar 10 13:50:37 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 13:50:38 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 13:50:38 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 13:50:38 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 14:11:32 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 14:41:40 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 14:50:36 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 14:50:38 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27868/-1 pkts=706/0
Mar 10 14:50:38 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 14:50:38 vpnclient5[14666]: VERIFY KU OK
Mar 10 14:50:38 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 14:50:38 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 14:50:38 vpnclient5[14666]: VERIFY EKU OK
Mar 10 14:50:38 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 14:50:40 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 14:50:40 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 14:50:40 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 15:41:56 acsd: eth5: selected_chspec is 1009 (9)
Mar 10 15:41:56 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Mar 10 15:41:56 acsd: eth5: selected channel spec: 0x1009 (9)
Mar 10 15:50:38 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 15:50:40 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28320/-1 pkts=710/0
Mar 10 15:50:40 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 15:50:40 vpnclient5[14666]: VERIFY KU OK
Mar 10 15:50:40 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 15:50:40 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 15:50:40 vpnclient5[14666]: VERIFY EKU OK
Mar 10 15:50:40 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 15:50:42 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 15:50:42 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 15:50:42 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 16:27:10 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 16:50:41 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 16:50:42 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 16:50:42 vpnclient5[14666]: VERIFY KU OK
Mar 10 16:50:42 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 16:50:42 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 16:50:42 vpnclient5[14666]: VERIFY EKU OK
Mar 10 16:50:42 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 16:50:43 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 16:50:43 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 16:50:43 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 17:27:25 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 17:42:30 acsd: eth5: selected_chspec is 1008 (8)
Mar 10 17:42:30 acsd: eth5: Adjusted channel spec: 0x1008 (8)
Mar 10 17:42:30 acsd: eth5: selected channel spec: 0x1008 (8)
Mar 10 17:50:42 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 17:50:43 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28035/-1 pkts=707/0
Mar 10 17:50:43 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 17:50:43 vpnclient5[14666]: VERIFY KU OK
Mar 10 17:50:43 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 17:50:43 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 17:50:43 vpnclient5[14666]: VERIFY EKU OK
Mar 10 17:50:43 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 17:50:44 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 17:50:44 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 17:50:44 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 17:57:34 acsd: eth5: selected_chspec is 1009 (9)
Mar 10 17:57:34 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Mar 10 17:57:34 acsd: eth5: selected channel spec: 0x1009 (9)
Mar 10 18:27:42 acsd: eth5: selected_chspec is 1008 (8)
Mar 10 18:27:42 acsd: eth5: Adjusted channel spec: 0x1008 (8)
Mar 10 18:27:42 acsd: eth5: selected channel spec: 0x1008 (8)
Mar 10 18:50:43 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 18:50:44 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28578/-1 pkts=712/0
Mar 10 18:50:44 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 18:50:44 vpnclient5[14666]: VERIFY KU OK
Mar 10 18:50:44 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 18:50:44 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 18:50:44 vpnclient5[14666]: VERIFY EKU OK
Mar 10 18:50:44 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 18:50:45 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 18:50:45 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 18:50:45 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 19:12:53 acsd: eth5: selected_chspec is 100a (10)
Mar 10 19:12:53 acsd: eth5: Adjusted channel spec: 0x100a (10)
Mar 10 19:12:53 acsd: eth5: selected channel spec: 0x100a (10)
Mar 10 19:50:44 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 19:50:45 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 19:50:45 vpnclient5[14666]: VERIFY KU OK
Mar 10 19:50:45 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 19:50:45 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 19:50:45 vpnclient5[14666]: VERIFY EKU OK
Mar 10 19:50:45 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 19:50:47 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 19:50:47 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 19:50:47 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 19:58:06 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 20:43:19 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 20:50:45 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 20:50:47 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28474/-1 pkts=708/0
Mar 10 20:50:47 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 20:50:47 vpnclient5[14666]: VERIFY KU OK
Mar 10 20:50:47 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 20:50:47 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 20:50:47 vpnclient5[14666]: VERIFY EKU OK
Mar 10 20:50:47 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 20:50:49 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 20:50:49 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 20:50:49 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 21:28:31 acsd: eth5: selected_chspec is 1004 (4)
Mar 10 21:28:31 acsd: eth5: Adjusted channel spec: 0x1004 (4)
Mar 10 21:28:31 acsd: eth5: selected channel spec: 0x1004 (4)
Mar 10 21:43:35 acsd: eth5: selected_chspec is 1008 (8)
Mar 10 21:43:35 acsd: eth5: Adjusted channel spec: 0x1008 (8)
Mar 10 21:43:35 acsd: eth5: selected channel spec: 0x1008 (8)
Mar 10 21:50:48 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 21:50:49 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 21:50:49 vpnclient5[14666]: VERIFY KU OK
Mar 10 21:50:49 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 21:50:49 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 21:50:49 vpnclient5[14666]: VERIFY EKU OK
Mar 10 21:50:49 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 21:50:50 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 21:50:50 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 21:50:50 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 21:58:39 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 22:50:49 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 22:50:50 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27533/-1 pkts=703/0
Mar 10 22:50:50 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 22:50:50 vpnclient5[14666]: VERIFY KU OK
Mar 10 22:50:50 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 22:50:50 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 22:50:50 vpnclient5[14666]: VERIFY EKU OK
Mar 10 22:50:50 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 22:50:51 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 22:50:51 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 22:50:51 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 10 23:22:37 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 10 23:50:50 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 10 23:50:51 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27851/-1 pkts=707/0
Mar 10 23:50:51 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 10 23:50:51 vpnclient5[14666]: VERIFY KU OK
Mar 10 23:50:51 vpnclient5[14666]: Validating certificate extended key usage
Mar 10 23:50:51 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 10 23:50:51 vpnclient5[14666]: VERIFY EKU OK
Mar 10 23:50:51 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 10 23:50:53 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 23:50:53 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 10 23:50:53 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 00:07:50 acsd: eth5: selected_chspec is 1009 (9)
Mar 11 00:07:50 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Mar 11 00:07:50 acsd: eth5: selected channel spec: 0x1009 (9)
Mar 11 00:22:54 acsd: eth5: selected_chspec is 1008 (8)
Mar 11 00:22:54 acsd: eth5: Adjusted channel spec: 0x1008 (8)
Mar 11 00:22:54 acsd: eth5: selected channel spec: 0x1008 (8)
Mar 11 00:37:58 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 00:50:51 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 00:50:53 vpnclient5[14666]: TLS: soft reset sec=0 bytes=29369/-1 pkts=717/0
Mar 11 00:50:53 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 00:50:53 vpnclient5[14666]: VERIFY KU OK
Mar 11 00:50:53 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 00:50:53 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 00:50:53 vpnclient5[14666]: VERIFY EKU OK
Mar 11 00:50:53 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 00:50:54 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 00:50:54 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 00:50:54 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 00:53:02 acsd: eth5: selected_chspec is 100a (10)
Mar 11 00:53:02 acsd: eth5: Adjusted channel spec: 0x100a (10)
Mar 11 00:53:02 acsd: eth5: selected channel spec: 0x100a (10)
Mar 11 01:50:53 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 01:50:54 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28345/-1 pkts=710/0
Mar 11 01:50:54 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 01:50:54 vpnclient5[14666]: VERIFY KU OK
Mar 11 01:50:54 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 01:50:54 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 01:50:54 vpnclient5[14666]: VERIFY EKU OK
Mar 11 01:50:54 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 01:50:56 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 01:50:56 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 01:50:56 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 02:50:54 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 02:50:56 vpnclient5[14666]: TLS: soft reset sec=0 bytes=30065/-1 pkts=723/0
Mar 11 02:50:56 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 02:50:56 vpnclient5[14666]: VERIFY KU OK
Mar 11 02:50:56 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 02:50:56 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 02:50:56 vpnclient5[14666]: VERIFY EKU OK
Mar 11 02:50:56 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 02:50:57 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 02:50:57 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 02:50:57 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 02:38:00 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6161)]period_retry = 0
Mar 11 02:38:04 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6190)]retrieve firmware information
Mar 11 02:38:04 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6206)]no need to upgrade firmware
Mar 11 02:38:33 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6161)]period_retry = 1
Mar 11 02:38:37 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6190)]retrieve firmware information
Mar 11 02:38:37 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6206)]no need to upgrade firmware
Mar 11 02:39:06 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6161)]period_retry = 2
Mar 11 02:39:10 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6190)]retrieve firmware information
Mar 11 02:39:10 WATCHDOG: [FAUPGRADE][auto_firmware_check:(6206)]no need to upgrade firmware
Mar 11 03:50:57 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28847/-1 pkts=714/0
Mar 11 03:50:57 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 03:50:57 vpnclient5[14666]: VERIFY KU OK
Mar 11 03:50:57 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 03:50:57 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 03:50:57 vpnclient5[14666]: VERIFY EKU OK
Mar 11 03:50:57 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 03:50:58 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 03:50:58 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 03:50:58 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 04:39:04 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 04:50:58 vpnclient5[14666]: TLS: soft reset sec=0 bytes=29329/-1 pkts=717/0
Mar 11 04:50:58 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 04:50:58 vpnclient5[14666]: VERIFY KU OK
Mar 11 04:50:58 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 04:50:58 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 04:50:58 vpnclient5[14666]: VERIFY EKU OK
Mar 11 04:50:58 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 04:50:59 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 04:50:59 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 04:50:59 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 05:50:58 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 05:50:59 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28856/-1 pkts=715/0
Mar 11 05:50:59 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 05:50:59 vpnclient5[14666]: VERIFY KU OK
Mar 11 05:50:59 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 05:50:59 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 05:50:59 vpnclient5[14666]: VERIFY EKU OK
Mar 11 05:50:59 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 05:51:01 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 05:51:01 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 05:51:01 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 06:42:45 aaews[14642]: Tunnel built failed. status code=[370082]
Mar 11 06:42:45 aaews[14642]: Tunnel built failed. status code=[477]
Mar 11 06:50:59 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 06:51:01 vpnclient5[14666]: TLS: soft reset sec=0 bytes=64661/-1 pkts=987/0
Mar 11 06:51:02 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 06:51:02 vpnclient5[14666]: VERIFY KU OK
Mar 11 06:51:02 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 06:51:02 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 06:51:02 vpnclient5[14666]: VERIFY EKU OK
Mar 11 06:51:02 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 06:51:03 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 06:51:03 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 06:51:03 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 07:51:01 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 07:51:03 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 07:51:03 vpnclient5[14666]: VERIFY KU OK
Mar 11 07:51:03 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 07:51:03 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 07:51:03 vpnclient5[14666]: VERIFY EKU OK
Mar 11 07:51:03 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 07:51:04 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 07:51:04 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 07:51:04 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 08:51:03 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 08:51:04 vpnclient5[14666]: TLS: soft reset sec=0 bytes=31368/-1 pkts=731/0
Mar 11 08:51:04 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 08:51:04 vpnclient5[14666]: VERIFY KU OK
Mar 11 08:51:04 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 08:51:04 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 08:51:04 vpnclient5[14666]: VERIFY EKU OK
Mar 11 08:51:04 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 08:51:05 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 08:51:05 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 08:51:05 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 09:10:22 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 09:40:31 acsd: eth5: selected_chspec is 1008 (8)
Mar 11 09:40:31 acsd: eth5: Adjusted channel spec: 0x1008 (8)
Mar 11 09:40:31 acsd: eth5: selected channel spec: 0x1008 (8)
Mar 11 09:51:05 vpnclient5[14666]: TLS: soft reset sec=0 bytes=29529/-1 pkts=719/0
Mar 11 09:51:05 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 09:51:05 vpnclient5[14666]: VERIFY KU OK
Mar 11 09:51:05 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 09:51:05 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 09:51:05 vpnclient5[14666]: VERIFY EKU OK
Mar 11 09:51:05 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 09:51:06 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 09:51:06 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 09:51:06 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 10:51:05 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 10:51:06 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 10:51:06 vpnclient5[14666]: VERIFY KU OK
Mar 11 10:51:06 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 10:51:06 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 10:51:06 vpnclient5[14666]: VERIFY EKU OK
Mar 11 10:51:06 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 10:51:07 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 10:51:07 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 10:51:07 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 11:46:18 acsd: eth5: selected_chspec is 1004 (4)
Mar 11 11:46:18 acsd: eth5: Adjusted channel spec: 0x1004 (4)
Mar 11 11:46:18 acsd: eth5: selected channel spec: 0x1004 (4)
Mar 11 11:51:05 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 11:51:07 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 11:51:07 vpnclient5[14666]: VERIFY KU OK
Mar 11 11:51:07 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 11:51:07 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 11:51:07 vpnclient5[14666]: VERIFY EKU OK
Mar 11 11:51:07 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 11:51:08 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 11:51:08 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 11:51:08 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 12:51:07 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 12:51:08 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 12:51:08 vpnclient5[14666]: VERIFY KU OK
Mar 11 12:51:08 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 12:51:08 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 12:51:08 vpnclient5[14666]: VERIFY EKU OK
Mar 11 12:51:08 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 12:51:09 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 12:51:09 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 12:51:09 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 13:51:09 vpnclient5[14666]: TLS: soft reset sec=0 bytes=27999/-1 pkts=707/0
Mar 11 13:51:09 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 13:51:09 vpnclient5[14666]: VERIFY KU OK
Mar 11 13:51:09 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 13:51:09 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 13:51:09 vpnclient5[14666]: VERIFY EKU OK
Mar 11 13:51:09 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 13:51:10 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 13:51:10 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 13:51:10 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 14:02:00 acsd: eth5: selected_chspec is 1009 (9)
Mar 11 14:02:00 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Mar 11 14:02:00 acsd: eth5: selected channel spec: 0x1009 (9)
Mar 11 14:09:38 acsd: eth5: selected_chspec is 1003 (3)
Mar 11 14:09:38 acsd: eth5: Adjusted channel spec: 0x1003 (3)
Mar 11 14:09:38 acsd: eth5: selected channel spec: 0x1003 (3)
Mar 11 14:24:41 acsd: eth5: selected_chspec is 1009 (9)
Mar 11 14:24:41 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Mar 11 14:24:41 acsd: eth5: selected channel spec: 0x1009 (9)
Mar 11 14:51:09 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 14:51:10 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28055/-1 pkts=706/0
Mar 11 14:51:10 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 14:51:10 vpnclient5[14666]: VERIFY KU OK
Mar 11 14:51:10 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 14:51:10 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 14:51:10 vpnclient5[14666]: VERIFY EKU OK
Mar 11 14:51:10 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 14:51:11 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 14:51:11 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 14:51:11 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 15:40:02 acsd: eth5: selected_chspec is 100a (10)
Mar 11 15:40:02 acsd: eth5: Adjusted channel spec: 0x100a (10)
Mar 11 15:40:02 acsd: eth5: selected channel spec: 0x100a (10)
Mar 11 15:51:10 vpnclient5[14666]: TLS: tls_process: killed expiring key
Mar 11 15:51:11 vpnclient5[14666]: TLS: soft reset sec=0 bytes=28556/-1 pkts=708/0
Mar 11 15:51:11 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 15:51:11 vpnclient5[14666]: VERIFY KU OK
Mar 11 15:51:11 vpnclient5[14666]: Validating certificate extended key usage
Mar 11 15:51:11 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 15:51:11 vpnclient5[14666]: VERIFY EKU OK
Mar 11 15:51:11 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org
Mar 11 15:51:12 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:51:12 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:51:12 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 15:08:34 rc_service: httpd 17307:notify_rc restart_vpncall
Mar 11 15:08:37 rc_service: httpd 17307:notify_rc restart_vpncall
Mar 11 15:08:37 rc_service: waitting "restart_vpncall" via httpd ...
Mar 11 16:08:37 vpnclient5[14666]: event_wait : Interrupted system call (code=4)
Mar 11 16:08:37 vpnclient5[14666]: SIGTERM received, sending exit notification to peer
Mar 11 16:08:42 vpnclient5[14666]: Closing TUN/TAP interface
Mar 11 16:08:42 vpnclient5[14666]: /sbin/ifconfig tun15 0.0.0.0
Mar 11 16:08:42 vpnclient5[14666]: /sbin/ifconfig tun15 del fde6:7a:7d20:1548::10ce/64
Mar 11 16:08:42 vpnclient5[14666]: /etc/openvpn/ovpn-down tun15 1500 1553 10.25.72.208 255.255.255.0 init
Mar 11 16:08:42 vpnclient5[14666]: SIGTERM[soft,exit-with-notification] received, process exiting
Mar 11 15:08:45 rc_service: httpd 17307:notify_rc restart_vpncall
Mar 11 15:08:45 vpnclient5[9730]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020
Mar 11 15:08:45 vpnclient5[9730]: library versions: OpenSSL 1.0.2t  10 Sep 2019, LZO 2.03
Mar 11 15:08:45 vpnclient5[9731]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 11 15:08:45 vpnclient5[9731]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 11 15:08:45 vpnclient5[9731]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 11 15:08:45 vpnclient5[9731]: TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.143:443
Mar 11 15:08:45 vpnclient5[9731]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Mar 11 15:08:45 vpnclient5[9731]: UDP link local: (not bound)
Mar 11 15:08:45 vpnclient5[9731]: UDP link remote: [AF_INET]62.102.148.143:443
Mar 11 15:08:45 vpnclient5[9731]: TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=ecb21bb6 7cdfb56e
Mar 11 15:08:45 vpnclient5[9731]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 15:08:45 vpnclient5[9731]: VERIFY KU OK
Mar 11 15:08:45 vpnclient5[9731]: Validating certificate extended key usage
Mar 11 15:08:45 vpnclient5[9731]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 15:08:45 vpnclient5[9731]: VERIFY EKU OK
Mar 11 15:08:45 vpnclient5[9731]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 15:08:46 vpnclient5[9731]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 15:08:46 vpnclient5[9731]: [Menkab] Peer Connection Initiated with [AF_INET]62.102.148.143:443
Mar 11 15:08:48 vpnclient5[9731]: SENT CONTROL [Menkab]: 'PUSH_REQUEST' (status=1)
Mar 11 15:08:48 vpnclient5[9731]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.232.1,dhcp-option DNS6 fde6:7a:7d20:11e8::1,tun-ipv6,route-gateway 10.21.232.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11e8::1065/64 fde6:7a:7d20:11e8::1,ifconfig 10.21.232.103 255.255.255.0,peer-id 2,cipher AES-256-GCM'
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: timers and/or timeouts modified
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: compression parms modified
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: --ifconfig/up options modified
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: route options modified
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: route-related options modified
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: peer-id set
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: adjusting link_mtu to 1625
Mar 11 15:08:48 vpnclient5[9731]: OPTIONS IMPORT: data channel crypto options modified
Mar 11 15:08:48 vpnclient5[9731]: Data Channel: using negotiated cipher 'AES-256-GCM'
Mar 11 15:08:48 vpnclient5[9731]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:08:48 vpnclient5[9731]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:08:48 vpnclient5[9731]: GDG6: remote_host_ipv6=n/a
Mar 11 15:08:48 vpnclient5[9731]: TUN/TAP device tun15 opened
Mar 11 15:08:48 vpnclient5[9731]: TUN/TAP TX queue length set to 100
Mar 11 15:08:48 vpnclient5[9731]: /sbin/ifconfig tun15 10.21.232.103 netmask 255.255.255.0 mtu 1500 broadcast 10.21.232.255
Mar 11 15:08:48 vpnclient5[9731]: /sbin/ifconfig tun15 add fde6:7a:7d20:11e8::1065/64
Mar 11 15:08:48 vpnclient5[9731]: /etc/openvpn/ovpn-up tun15 1500 1553 10.21.232.103 255.255.255.0 init
Mar 11 15:08:53 vpnclient5[9731]: Initialization Sequence Completed
Mar 11 16:25:14 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 15:51:00 rc_service: httpd 17307:notify_rc restart_wan_if 0
Mar 11 15:51:00 vpnclient5[9731]: event_wait : Interrupted system call (code=4)
Mar 11 15:51:00 vpnclient5[9731]: SIGTERM received, sending exit notification to peer
Mar 11 15:51:05 vpnclient5[9731]: Closing TUN/TAP interface
Mar 11 15:51:05 vpnclient5[9731]: /sbin/ifconfig tun15 0.0.0.0
Mar 11 15:51:05 vpnclient5[9731]: /sbin/ifconfig tun15 del fde6:7a:7d20:11e8::1065/64
Mar 11 15:51:05 vpnclient5[9731]: /etc/openvpn/ovpn-down tun15 1500 1553 10.21.232.103 255.255.255.0 init
Mar 11 15:51:05 vpnclient5[9731]: SIGTERM[soft,exit-with-notification] received, process exiting
Mar 11 15:51:11 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
Mar 11 15:51:11 wan: finish adding multi routes
Mar 11 15:51:12 miniupnpd[31146]: shutting down MiniUPnPd
Mar 11 15:51:12 miniupnpd[14462]: version 1.9 started
Mar 11 15:51:12 miniupnpd[14462]: HTTP listening on port 38143
Mar 11 15:51:12 miniupnpd[14462]: Listening for NAT-PMP/PCP traffic on port 5351
Mar 11 15:51:12 vpnclient5[14476]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020
Mar 11 15:51:12 vpnclient5[14476]: library versions: OpenSSL 1.0.2t  10 Sep 2019, LZO 2.03
Mar 11 15:51:12 vpnclient5[14482]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 11 15:51:12 vpnclient5[14482]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 11 15:51:12 vpnclient5[14482]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 11 15:51:12 vpnclient5[14482]: TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.143:443
Mar 11 15:51:12 vpnclient5[14482]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Mar 11 15:51:12 vpnclient5[14482]: UDP link local: (not bound)
Mar 11 15:51:12 vpnclient5[14482]: UDP link remote: [AF_INET]62.102.148.143:443
Mar 11 15:51:12 vpnclient5[14482]: TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=7626ef1d 6f8663d4
Mar 11 15:51:12 vpnclient5[14482]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 15:51:12 vpnclient5[14482]: VERIFY KU OK
Mar 11 15:51:12 vpnclient5[14482]: Validating certificate extended key usage
Mar 11 15:51:12 vpnclient5[14482]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 15:51:12 vpnclient5[14482]: VERIFY EKU OK
Mar 11 15:51:12 vpnclient5[14482]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 15:51:13 vpnclient5[14482]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 15:51:13 vpnclient5[14482]: [Menkab] Peer Connection Initiated with [AF_INET]62.102.148.143:443
Mar 11 15:51:14 vpnclient5[14482]: SENT CONTROL [Menkab]: 'PUSH_REQUEST' (status=1)
Mar 11 15:51:14 vpnclient5[14482]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.232.1,dhcp-option DNS6 fde6:7a:7d20:11e8::1,tun-ipv6,route-gateway 10.21.232.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11e8::1065/64 fde6:7a:7d20:11e8::1,ifconfig 10.21.232.103 255.255.255.0,peer-id 2,cipher AES-256-GCM'
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: timers and/or timeouts modified
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: compression parms modified
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: --ifconfig/up options modified
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: route options modified
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: route-related options modified
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: peer-id set
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: adjusting link_mtu to 1625
Mar 11 15:51:14 vpnclient5[14482]: OPTIONS IMPORT: data channel crypto options modified
Mar 11 15:51:14 vpnclient5[14482]: Data Channel: using negotiated cipher 'AES-256-GCM'
Mar 11 15:51:14 vpnclient5[14482]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:51:14 vpnclient5[14482]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:51:14 vpnclient5[14482]: GDG6: remote_host_ipv6=n/a
Mar 11 15:51:14 vpnclient5[14482]: TUN/TAP device tun15 opened
Mar 11 15:51:14 vpnclient5[14482]: TUN/TAP TX queue length set to 100
Mar 11 15:51:14 vpnclient5[14482]: /sbin/ifconfig tun15 10.21.232.103 netmask 255.255.255.0 mtu 1500 broadcast 10.21.232.255
Mar 11 15:51:14 vpnclient5[14482]: /sbin/ifconfig tun15 add fde6:7a:7d20:11e8::1065/64
Mar 11 15:51:14 vpnclient5[14482]: /etc/openvpn/ovpn-up tun15 1500 1553 10.21.232.103 255.255.255.0 init
Mar 11 15:51:19 kernel: The For ALL DEVICES flag of Prof 1 has been set to ENABLE
Mar 11 15:51:19 BWDPI: fun bitmap = 4bf
Mar 11 15:51:19 A.QoS: qos_count=0, qos_check=0
Mar 11 15:51:20 vpnclient5[14482]: Initialization Sequence Completed
Mar 11 15:51:23 A.QoS: qos rule is less than 22
Mar 11 15:51:23 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:51:24 A.QoS: qos_count=0, qos_check=1
Mar 11 15:51:28 A.QoS: qos rule is less than 22
Mar 11 15:51:28 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:51:29 A.QoS: qos_count=1, qos_check=1
Mar 11 15:51:33 A.QoS: qos rule is less than 22
Mar 11 15:51:33 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:51:34 A.QoS: qos_count=2, qos_check=1
Mar 11 15:51:38 A.QoS: qos rule is less than 22
Mar 11 15:51:38 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:51:38 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
Mar 11 15:51:38 kernel: Archer TCP Pure ACK Enabled
Mar 11 15:51:38 dhcp client: bound 94.137.98.202/255.255.255.192 via 94.137.98.193 for 86400 seconds.
Mar 11 15:53:22 rc_service: httpd 17307:notify_rc restart_wan_if 0
Mar 11 15:53:22 vpnclient5[14482]: event_wait : Interrupted system call (code=4)
Mar 11 15:53:22 vpnclient5[14482]: SIGTERM received, sending exit notification to peer
Mar 11 15:53:27 vpnclient5[14482]: Closing TUN/TAP interface
Mar 11 15:53:27 vpnclient5[14482]: /sbin/ifconfig tun15 0.0.0.0
Mar 11 15:53:27 vpnclient5[14482]: /sbin/ifconfig tun15 del fde6:7a:7d20:11e8::1065/64
Mar 11 15:53:27 vpnclient5[14482]: /etc/openvpn/ovpn-down tun15 1500 1553 10.21.232.103 255.255.255.0 init
Mar 11 15:53:27 vpnclient5[14482]: SIGTERM[soft,exit-with-notification] received, process exiting
Mar 11 15:53:34 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
Mar 11 15:53:35 wan: finish adding multi routes
Mar 11 15:53:36 miniupnpd[14462]: shutting down MiniUPnPd
Mar 11 15:53:36 miniupnpd[16565]: version 1.9 started
Mar 11 15:53:36 miniupnpd[16565]: HTTP listening on port 50768
Mar 11 15:53:36 miniupnpd[16565]: Listening for NAT-PMP/PCP traffic on port 5351
Mar 11 15:53:36 vpnclient5[16590]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020
Mar 11 15:53:36 vpnclient5[16590]: library versions: OpenSSL 1.0.2t  10 Sep 2019, LZO 2.03
Mar 11 15:53:36 vpnclient5[16591]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 11 15:53:36 vpnclient5[16591]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 11 15:53:36 vpnclient5[16591]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mar 11 15:53:36 vpnclient5[16591]: TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.143:443
Mar 11 15:53:36 vpnclient5[16591]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Mar 11 15:53:36 vpnclient5[16591]: UDP link local: (not bound)
Mar 11 15:53:36 vpnclient5[16591]: UDP link remote: [AF_INET]62.102.148.143:443
Mar 11 15:53:36 vpnclient5[16591]: TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=9221ae8d 03708efa
Mar 11 15:53:36 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 15:53:36 vpnclient5[16591]: VERIFY KU OK
Mar 11 15:53:36 vpnclient5[16591]: Validating certificate extended key usage
Mar 11 15:53:36 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 15:53:36 vpnclient5[16591]: VERIFY EKU OK
Mar 11 15:53:36 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 15:53:38 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 15:53:38 vpnclient5[16591]: [Menkab] Peer Connection Initiated with [AF_INET]62.102.148.143:443
Mar 11 15:53:39 vpnclient5[16591]: SENT CONTROL [Menkab]: 'PUSH_REQUEST' (status=1)
Mar 11 15:53:39 vpnclient5[16591]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.232.1,dhcp-option DNS6 fde6:7a:7d20:11e8::1,tun-ipv6,route-gateway 10.21.232.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11e8::1065/64 fde6:7a:7d20:11e8::1,ifconfig 10.21.232.103 255.255.255.0,peer-id 2,cipher AES-256-GCM'
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: timers and/or timeouts modified
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: compression parms modified
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: --ifconfig/up options modified
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: route options modified
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: route-related options modified
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: peer-id set
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: adjusting link_mtu to 1625
Mar 11 15:53:39 vpnclient5[16591]: OPTIONS IMPORT: data channel crypto options modified
Mar 11 15:53:39 vpnclient5[16591]: Data Channel: using negotiated cipher 'AES-256-GCM'
Mar 11 15:53:39 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:53:39 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 15:53:39 vpnclient5[16591]: GDG6: remote_host_ipv6=n/a
Mar 11 15:53:39 vpnclient5[16591]: TUN/TAP device tun15 opened
Mar 11 15:53:39 vpnclient5[16591]: TUN/TAP TX queue length set to 100
Mar 11 15:53:39 vpnclient5[16591]: /sbin/ifconfig tun15 10.21.232.103 netmask 255.255.255.0 mtu 1500 broadcast 10.21.232.255
Mar 11 15:53:39 vpnclient5[16591]: /sbin/ifconfig tun15 add fde6:7a:7d20:11e8::1065/64
Mar 11 15:53:39 vpnclient5[16591]: /etc/openvpn/ovpn-up tun15 1500 1553 10.21.232.103 255.255.255.0 init
Mar 11 15:53:44 kernel: The For ALL DEVICES flag of Prof 1 has been set to ENABLE
Mar 11 15:53:44 BWDPI: fun bitmap = 4bf
Mar 11 15:53:44 A.QoS: qos_count=0, qos_check=0
Mar 11 15:53:44 vpnclient5[16591]: Initialization Sequence Completed
Mar 11 15:53:47 A.QoS: qos rule is less than 22
Mar 11 15:53:47 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:53:49 A.QoS: qos_count=0, qos_check=1
Mar 11 15:53:52 A.QoS: qos rule is less than 22
Mar 11 15:53:52 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:53:54 A.QoS: qos_count=1, qos_check=1
Mar 11 15:53:57 A.QoS: qos rule is less than 22
Mar 11 15:53:57 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:53:59 A.QoS: qos_count=2, qos_check=1
Mar 11 15:54:02 A.QoS: qos rule is less than 22
Mar 11 15:54:02 A.QoS: restart A.QoS because set_qos_conf / set_qos_on / setup rule fail
Mar 11 15:54:02 nat: apply nat rules (/tmp/nat_rules_eth0_eth0)
Mar 11 15:54:02 kernel: Archer TCP Pure ACK Enabled
Mar 11 15:54:02 dhcp client: bound 94.137.98.202/255.255.255.192 via 94.137.98.193 for 86400 seconds.
Mar 11 16:55:23 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 16:53:37 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 16:53:37 vpnclient5[16591]: VERIFY KU OK
Mar 11 16:53:37 vpnclient5[16591]: Validating certificate extended key usage
Mar 11 16:53:37 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 16:53:37 vpnclient5[16591]: VERIFY EKU OK
Mar 11 16:53:37 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 16:53:39 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 16:53:39 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 16:53:39 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 17:55:39 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 18:25:47 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 18:40:51 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 17:53:37 vpnclient5[16591]: TLS: tls_process: killed expiring key
Mar 11 17:53:38 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 17:53:38 vpnclient5[16591]: VERIFY KU OK
Mar 11 17:53:38 vpnclient5[16591]: Validating certificate extended key usage
Mar 11 17:53:38 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 17:53:38 vpnclient5[16591]: VERIFY EKU OK
Mar 11 17:53:38 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 17:53:40 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 17:53:40 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 17:53:40 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 18:55:55 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 19:41:08 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 18:53:38 vpnclient5[16591]: TLS: tls_process: killed expiring key
Mar 11 18:53:40 vpnclient5[16591]: TLS: soft reset sec=0 bytes=29595/-1 pkts=712/0
Mar 11 18:53:40 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 18:53:40 vpnclient5[16591]: VERIFY KU OK
Mar 11 18:53:40 vpnclient5[16591]: Validating certificate extended key usage
Mar 11 18:53:40 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 18:53:40 vpnclient5[16591]: VERIFY EKU OK
Mar 11 18:53:40 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 18:53:42 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 18:53:42 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 18:53:42 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 19:56:11 acsd: eth5: selected_chspec is 1009 (9)
Mar 11 19:56:11 acsd: eth5: Adjusted channel spec: 0x1009 (9)
Mar 11 19:56:11 acsd: eth5: selected channel spec: 0x1009 (9)
Mar 11 19:53:40 vpnclient5[16591]: TLS: tls_process: killed expiring key
Mar 11 19:53:42 vpnclient5[16591]: TLS: soft reset sec=0 bytes=28929/-1 pkts=716/0
Mar 11 19:53:42 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 19:53:42 vpnclient5[16591]: VERIFY KU OK
Mar 11 19:53:42 vpnclient5[16591]: Validating certificate extended key usage
Mar 11 19:53:42 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 19:53:42 vpnclient5[16591]: VERIFY EKU OK
Mar 11 19:53:42 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 19:53:44 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 19:53:44 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 19:53:44 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 20:56:30 acsd: eth5: staying in current channel as txop is recovered with in time limit
Mar 11 20:53:42 vpnclient5[16591]: TLS: tls_process: killed expiring key
Mar 11 20:53:44 vpnclient5[16591]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mar 11 20:53:44 vpnclient5[16591]: VERIFY KU OK
Mar 11 20:53:44 vpnclient5[16591]: Validating certificate extended key usage
Mar 11 20:53:44 vpnclient5[16591]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mar 11 20:53:44 vpnclient5[16591]: VERIFY EKU OK
Mar 11 20:53:44 vpnclient5[16591]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Menkab, emailAddress=info@airvpn.org
Mar 11 20:53:45 vpnclient5[16591]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 20:53:45 vpnclient5[16591]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mar 11 20:53:45 vpnclient5[16591]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mar 11 22:11:52 acsd: eth5: staying in current channel as txop is recovered with in time limit

but is going to session have two see picture OS TYP linux that my router there is an connecting.
runing now windows 10 app from you.
but will change to another router later in mars here and hope going better with that router of course.

Kind Regards
Bengt

 

Edited ... by giganerd
Apply LOG formatting to logs

Share this post


Link to post

Hello!

@busolof

Actually according to the log OpenVPN connected successfully and remained connected for several hours. Since Asus offered to replace the device, then something wrong that's specific to your own one might be the problem.

Even the fact that you say that you can't upgrade to Asus Merlin is unusual. In AsusWRT routers, upgrading to Merlin is a matter of a few clicks, literally. https://blog.usro.net/how-to-install-asus-wrt-merlin-router-firmware/

We're confident that the router replacement will solve any issue. Or maybe the AX56U has some problem that makes its behavior inconsistent with the AC56U and AC68U (which is an AsusWRT router we own and which we based our tests on).

@giganerd

Reviewed the guide for AsusWRT and it is up to date.

Kind regards


 

Share this post


Link to post

Hello,
yes OpenVPN have connecting to your vpn server but something wrong on my router not showing outside of my network. Think is an bug in OpenVpn on my Asus router for erything is working perfect in my home.
Will have wait see if coming an patch before end of Mars perhaps fix my problem hope that. But will buy another router Asus RT-AX92U or Netgear Nigthhawk x10 think that Netgear can install customs firmware.
meanwhile will run your windows 10 app until fixed or provided another router where vpn will work 100%

Kind Regards
Bengt

Share this post


Link to post

Hello,
was an beta for my router from asus merlin but not working for me tryed 3 times think will wait an stable version

Share this post


Link to post

Hello,
I got that openvpn working now, was do harware reset before installed an beta of asus merling for my router asus rt-ax56u but my wan port showing red ligth nut can surfing on internet

Share this post


Link to post

Hey,
tryed change another vpn server then will that not working tryed get that working again not luck think is something wrong on my router

Share this post


Link to post
19 hours ago, busolof said:

But use Asus RT-AX56U think is an bug in openvpn client but found on https://www.asuswrt-merlin.net/  
tested that beta says is connecting
But will buy an netgear r9000 and is no problem with that routers what iknow
Will try fix my asus router first
 


Have you tried to get help in the Merlin Asus forum?  There's a thread specifically for the new build that supports your router.

https://www.snbforums.com/threads/beta-asuswrt-merlin-384-16-beta-and-384-13_5-are-available.62699/

Share this post


Link to post
15 minutes ago, go558a83nk said:

Have you tried to get help in the Merlin Asus forum?  There's a thread specifically for the new build that supports your router.

https://www.snbforums.com/threads/beta-asuswrt-merlin-384-16-beta-and-384-13_5-are-available.62699/
yes but they will not answer me
have another great problem:
Mar 21 15:08:51 wlceventd: wlceventd_proc_event(527): eth6: Assoc E8:4E:06:51:FB:73, status: Successful (0)
Mar 21 15:08:51 kernel: CFG80211-ERROR) wl_cfg80211_change_station : WLC_SCB_AUTHORIZE sta_flags_mask not set
Mar 21 15:08:52 hostapd: eth6: STA e8:4e:06:51:fb:73 RADIUS: starting accounting session 58AC8DE53E86D160
Mar 21 15:08:52 hostapd: eth6: STA e8:4e:06:51:fb:73 WPA: pairwise key handshake completed (RSN)
Mar 21 15:08:52 dnsmasq-dhcp[1304]: DHCPREQUEST(br0) 192.168.50.192 e8:4e:06:51:fb:73
Mar 21 15:08:52 dnsmasq-dhcp[1304]: Ignoring domain olssondata.intranet for DHCP host name hpwin10pro
Mar 21 15:08:52 dnsmasq-dhcp[1304]: DHCPACK(br0) 192.168.50.192 e8:4e:06:51:fb:73 hpwin10pro
Mar 21 15:09:26 wlceventd: wlceventd_proc_event(464): eth6: Deauth_ind E8:4E:06:51:FB:73, status: 0, reason: Disassociated due to inactivity (4)
Mar 21 15:09:26 hostapd: eth6: STA e8:4e:06:51:fb:73 IEEE 802.11: disassociated

has no problem before not understand why my laptop is blocked now

Share this post


Link to post

and flashed back to asus firmware then working my laptop again must be an bug not understand tryed everything

Share this post


Link to post

never give up tryed again now working that was in ovpn file change no to ipv6.
Will run on that now

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...