Ysurac / openmptcprouter

OpenMPTCProuter is an open source solution to aggregate multiple internet connections using Multipath TCP (MPTCP) on OpenWrt
https://www.openmptcprouter.com/
GNU General Public License v3.0
1.82k stars 259 forks source link

Soucis concernant les soucis de connexion aux API de Discord, npmjs, etc.. #1281

Closed AdrienDssy closed 4 years ago

AdrienDssy commented 4 years ago

Current Behavior

Il ce peux que la plupart du temps j'obtiens une erreur côté Discord, NPMJS, etc... request to https://discordapp.com/api/v7/failed, reason: getaddrinfo EAI_AGAIN discordapp.com request to https://discord.com/api/v7/failed, reason: getaddrinfo EAI_AGAIN discord.com, etc...

Faut-il configurer un truc en particulier sur le routeur car sur mon home lab je n'ai pas de soucis point de vu réseau, j'ai tout vérifier.

Specifications

Ysurac commented 4 years ago

Ca ressemble à un soucis DNS. Donc il faut vérifier la configuration DNS au niveau du poste client et si jamais elle a été modifiée sur le routeur.

AdrienDssy commented 4 years ago

Visiblement rien ne change et les DNS n'ont pas été touchés côté routeur 🤔🤔

kevin39 commented 4 years ago

Ouvre une invite de commande et tape :

nslookup discord.com nslookup discordapp.com

Tu obtiens quoi ?

AdrienDssy commented 4 years ago

Serveur : OpenMPTCProuter.lan Address: 192.168.100.1

Réponse ne faisant pas autorité : Nom : discord.com Addresses: 162.159.138.232 162.159.135.232 162.159.137.232 162.159.136.232 162.159.128.233

nslookup discordapp.com

Serveur : OpenMPTCProuter.lan Address: 192.168.100.1

Réponse ne faisant pas autorité : Nom : discordapp.com Addresses: 162.159.130.233 162.159.129.233 162.159.133.233 162.159.134.233 162.159.135.233

AdrienDssy commented 4 years ago

J'ai essayer avec des interfaces différentes (carte réseau interne, carte réseau externe et carte réseau PCI-E) et j'ai toujours le soucis de timeout

kevin39 commented 4 years ago

Tu as essayé d'un autre PC et/ou d'un autre navigateur ?

AdrienDssy commented 4 years ago

ça à l'air de venir quelques part sur le routeur car mon père aussi à des soucis des fois 🤔

Ysurac commented 4 years ago

Chez qui est le VPS ? Que donne la charge CPU du VPS (via top ou htop par exemple) ? Le soucis est sporadique ou toujours sur les mêmes sites ?

AdrienDssy commented 4 years ago

Google, anciennement OVH mais le soucis restais le même La charge CPU est d'environ 10% Le soucis est sporadique

Ysurac commented 4 years ago

Les connexions sont de quel type ? LTE, ADSL, FTTH, autre ? Pas de wifi quelque part ?

Il faudrait aussi voir dans Etat->Journal Système ce qu'il peut y avoir.

AdrienDssy commented 4 years ago

LTE,ADSL

Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: reading acknowledgement record from packet Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: reading acknowledgement record from packet Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: reading acknowledgement record from packet Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: reading acknowledgement record from packet Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: reading acknowledgement record from packet Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: reading acknowledgement record from packet Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: reading acknowledgement record from packet Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:46:47 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:46:49 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Thu Oct 8 19:46:49 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:46:49 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 19:46:50 2020 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Thu Oct 8 19:46:50 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Connection reset by peer Thu Oct 8 19:46:52 2020 user.notice post-tracking-post-tracking: wan1 (eth4) switched up Thu Oct 8 19:46:52 2020 user.notice post-tracking-post-tracking: Set server VPS (35.210.18.10) default route via 192.168.10.1 Thu Oct 8 19:46:52 2020 daemon.err /usr/bin/ss-redir[15647]: remote recv: Connection reset by peer Thu Oct 8 19:46:52 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Connection reset by peer Thu Oct 8 19:46:52 2020 user.notice OMR-VPS: Can't get token, try later Thu Oct 8 19:46:52 2020 daemon.err /usr/bin/ss-redir[15647]: remote recv: Connection reset by peer Thu Oct 8 19:46:52 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Connection reset by peer Thu Oct 8 19:46:52 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Connection reset by peer Thu Oct 8 19:46:52 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Connection reset by peer Thu Oct 8 19:46:54 2020 user.notice post-tracking-post-tracking: Tunnel up disable use of ShadowSocks for UDP Thu Oct 8 19:46:55 2020 user.notice Shadowsocks: Rules DOWN Thu Oct 8 19:46:55 2020 user.notice Shadowsocks: Rules UP Thu Oct 8 19:46:55 2020 user.notice Shadowsocks: Reload omr-bypass rules Thu Oct 8 19:46:55 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 19:46:55 2020 user.notice omr-bypass: Reload dnsmasq... Thu Oct 8 19:46:55 2020 daemon.info dnsmasq[29711]: read /etc/hosts - 4 addresses Thu Oct 8 19:46:55 2020 daemon.info dnsmasq[29711]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 19:46:55 2020 daemon.info dnsmasq-dhcp[29711]: read /etc/ethers - 0 addresses Thu Oct 8 19:46:55 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 19:46:59 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 19:46:59 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 19:46:59 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:46:59 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 19:46:59 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:46:59 2020 user.notice post-tracking-post-tracking: Set server VPS (35.210.18.10) route via 192.168.10.1 metric 3 Thu Oct 8 19:46:59 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:01 2020 daemon.err /usr/bin/ss-redir[15647]: remote recv: Connection reset by peer Thu Oct 8 19:47:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:03 2020 daemon.info dnsmasq-dhcp[29711]: DHCPREQUEST(eth0) 192.168.100.230 00:26:f2:b8:33:cd Thu Oct 8 19:47:03 2020 daemon.info dnsmasq-dhcp[29711]: DHCPACK(eth0) 192.168.100.230 00:26:f2:b8:33:cd Thu Oct 8 19:47:04 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:05 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:05 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:06 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:08 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:09 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:09 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:10 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:16 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:17 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Connection reset by peer Thu Oct 8 19:47:17 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:17 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:18 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:19 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:20 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:21 2020 daemon.err /usr/bin/ss-redir[15647]: remote recv: Connection reset by peer Thu Oct 8 19:47:32 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_ACK_V1) Thu Oct 8 19:47:33 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:33 2020 daemon.err /usr/bin/ss-redir[15647]: remote recv: Connection reset by peer Thu Oct 8 19:47:34 2020 daemon.err openvpn(wan3)[12415]: TLS Error: Unroutable control packet received from [AF_INET]54.38.188.175:65301 (si=3 op=P_CONTROL_V1) Thu Oct 8 19:47:58 2020 daemon.notice netifd: Network device 'eth3' link is up Thu Oct 8 19:47:58 2020 daemon.notice netifd: Interface 'wan2' has link connectivity Thu Oct 8 19:47:58 2020 kern.info kernel: [ 292.048993] bnx2 0000:04:00.1 eth3: NIC Copper Link is Up, 100 Mbps full duplex Thu Oct 8 19:47:58 2020 kern.warn kernel: [ 292.049707] , receive & transmit flow control ON Thu Oct 8 19:47:59 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Thu Oct 8 19:47:59 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:47:59 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 19:48:01 2020 user.notice post-tracking-post-tracking: wan2 (eth3) switched up Thu Oct 8 19:48:01 2020 user.notice post-tracking-post-tracking: Set server VPS (35.210.18.10) route via 192.168.1.1 metric 4 Thu Oct 8 19:48:19 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 19:48:19 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 19:48:19 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:48:19 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 19:48:19 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:48:19 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 19:48:19 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 19:48:19 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 19:48:19 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 19:48:19 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:48:19 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 19:48:40 2020 daemon.info vnstatd[6709]: Info: Detected bandwidth limit for "eth3" changed from 1000 Mbit to 100 Mbit. Thu Oct 8 19:48:59 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 19:48:59 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 19:48:59 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:48:59 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 19:48:59 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:48:59 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 19:48:59 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 19:48:59 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 19:48:59 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 19:48:59 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:48:59 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 19:50:19 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 19:50:19 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 19:50:19 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:50:19 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 19:50:19 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:50:20 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 19:50:20 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 19:50:20 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 19:50:20 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 19:50:20 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:50:20 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 19:53:00 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 19:53:00 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 19:53:00 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:53:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 19:53:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:53:00 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 19:53:00 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 19:53:00 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 19:53:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 19:53:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:53:00 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 19:58:00 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 19:58:00 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 19:58:00 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:58:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 19:58:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 19:58:00 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 19:58:00 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 19:58:00 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 19:58:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 19:58:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 19:58:00 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:00:00 2020 cron.err crond[5260]: USER root pid 11711 cmd /etc/init.d/vnstat_backup backup Thu Oct 8 20:01:50 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 20:03:00 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:03:00 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:03:00 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:03:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:03:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:03:00 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:03:00 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:03:00 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:03:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:03:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:03:00 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:08:00 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:08:00 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:08:00 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:08:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:08:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:08:00 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:08:00 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:08:00 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:08:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:08:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:08:00 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:10:24 2020 kern.info kernel: [ 1638.564433] usb 3-5: new high-speed USB device number 4 using xhci_hcd Thu Oct 8 20:10:25 2020 kern.info kernel: [ 1638.848612] usb 3-5: reset high-speed USB device number 4 using xhci_hcd Thu Oct 8 20:10:25 2020 kern.info kernel: [ 1639.032921] r8152 3-5:1.0 eth5: v1.10.11 Thu Oct 8 20:10:25 2020 user.notice ModemManager: hotplug: add network interface eth5: event processed Thu Oct 8 20:10:25 2020 user.notice ModemManager: hotplug: event reported: action=add, name=eth5, subsystem=net Thu Oct 8 20:10:25 2020 user.notice ModemManager: hotplug: no need to wait for modem at sysfs path /sys/devices/pci0000:00/0000:00:14.0/usb3/3-5 Thu Oct 8 20:10:27 2020 daemon.info [6763]: [base-manager] couldn't check support for device '/sys/devices/pci0000:00/0000:00:14.0/usb3/3-5': not supported by any plugin Thu Oct 8 20:13:00 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:13:00 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:13:00 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:13:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:13:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:13:00 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:13:00 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:13:00 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:13:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:13:00 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:13:00 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:15:28 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 20:15:44 2020 user.notice omr-tracker: Launching... Thu Oct 8 20:15:44 2020 user.notice omr-tracker: Launched Thu Oct 8 20:15:44 2020 daemon.info glorytun: starting glorytun vpn instance vpn Thu Oct 8 20:15:44 2020 daemon.notice netifd: Interface 'lan' is now down Thu Oct 8 20:15:44 2020 daemon.debug dnsmasq[29711]: stopped listening on eth0(#9): 192.168.100.1 port 53 Thu Oct 8 20:15:44 2020 daemon.notice netifd: Interface 'lan' is disabled Thu Oct 8 20:15:44 2020 daemon.notice netifd: Interface 'lan' has link connectivity loss Thu Oct 8 20:15:44 2020 daemon.debug dnsmasq[29711]: stopped listening on eth0(#9): fd9b:2a5e:bd51::1 port 53 Thu Oct 8 20:15:44 2020 daemon.debug dnsmasq[29711]: stopped listening on eth0(#9): fe80::210:18ff:fe8c:92f8%eth0 port 53 Thu Oct 8 20:15:44 2020 daemon.notice netifd: Interface 'lan' is enabled Thu Oct 8 20:15:44 2020 daemon.notice netifd: Interface 'lan' is setting up now Thu Oct 8 20:15:44 2020 daemon.debug dnsmasq[29711]: listening on eth5(#28): 192.168.100.1 port 53 Thu Oct 8 20:15:44 2020 daemon.notice netifd: Interface 'lan' is now up Thu Oct 8 20:15:44 2020 user.notice firewall: Reloading firewall due to ifup of lan (eth5) Thu Oct 8 20:15:45 2020 user.notice mptcp: Reloading mptcp config due to ifup of lan (eth5) Thu Oct 8 20:15:45 2020 daemon.info dnsmasq[29711]: read /etc/hosts - 4 addresses Thu Oct 8 20:15:45 2020 daemon.info dnsmasq[29711]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:15:45 2020 daemon.info dnsmasq-dhcp[29711]: read /etc/ethers - 0 addresses Thu Oct 8 20:15:46 2020 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Thu Oct 8 20:15:47 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 20:15:47 2020 user.notice omr-bypass: Restart dnsmasq... Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[29711]: exiting on receipt of SIGTERM Thu Oct 8 20:15:47 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Oct 8 20:15:47 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Oct 8 20:15:47 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: started, version 2.82 cachesize 150 Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Oct 8 20:15:47 2020 daemon.info dnsmasq-dhcp[8949]: DHCP, IP range 192.168.100.100 -- 192.168.100.249, lease time 12h Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain test Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain onion Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain localhost Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain local Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain invalid Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain bind Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain use-application-dns.net Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using only locally-known addresses for domain lan Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using nameserver 127.0.0.1#5353 Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: using 1 more local addresses Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: read /etc/hosts - 4 addresses Thu Oct 8 20:15:47 2020 daemon.info dnsmasq[8949]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:15:47 2020 daemon.info dnsmasq-dhcp[8949]: read /etc/ethers - 0 addresses Thu Oct 8 20:15:47 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 20:15:49 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 20:15:51 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Operation timed out Thu Oct 8 20:15:51 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Operation timed out Thu Oct 8 20:15:52 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Operation timed out Thu Oct 8 20:15:53 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Host is unreachable Thu Oct 8 20:15:53 2020 daemon.notice netifd: Network device 'eth5' link is up Thu Oct 8 20:15:53 2020 daemon.notice netifd: Interface 'lan' has link connectivity Thu Oct 8 20:15:53 2020 kern.info kernel: [ 1967.612423] IPv6: ADDRCONF(NETDEV_CHANGE): eth5: link becomes ready Thu Oct 8 20:15:53 2020 kern.info kernel: [ 1967.613479] r8152 3-5:1.0 eth5: carrier on Thu Oct 8 20:15:55 2020 daemon.info dnsmasq[8949]: read /etc/hosts - 4 addresses Thu Oct 8 20:15:55 2020 daemon.info dnsmasq[8949]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:15:55 2020 daemon.info dnsmasq-dhcp[8949]: read /etc/ethers - 0 addresses Thu Oct 8 20:15:55 2020 daemon.debug dnsmasq[8949]: listening on eth5(#28): fe80::210:18ff:fe8c:92f8%eth5 port 53 Thu Oct 8 20:15:55 2020 daemon.debug dnsmasq[8949]: listening on eth5(#28): fd9b:2a5e:bd51::1 port 53 Thu Oct 8 20:15:56 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 20:15:56 2020 user.notice omr-bypass: Restart dnsmasq... Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[8949]: exiting on receipt of SIGTERM Thu Oct 8 20:15:56 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Oct 8 20:15:56 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Oct 8 20:15:56 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: started, version 2.82 cachesize 150 Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Oct 8 20:15:56 2020 daemon.info dnsmasq-dhcp[11128]: DHCP, IP range 192.168.100.100 -- 192.168.100.249, lease time 12h Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain test Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain onion Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain localhost Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain local Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain invalid Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain bind Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain use-application-dns.net Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using only locally-known addresses for domain lan Thu Oct 8 20:15:56 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using nameserver 127.0.0.1#5353 Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: using 1 more local addresses Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: read /etc/hosts - 4 addresses Thu Oct 8 20:15:56 2020 daemon.info dnsmasq[11128]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:15:56 2020 daemon.info dnsmasq-dhcp[11128]: read /etc/ethers - 0 addresses Thu Oct 8 20:18:00 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:18:00 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:18:00 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:18:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:18:00 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:18:01 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:18:01 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:18:01 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:18:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:18:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:18:01 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:21:46 2020 daemon.notice netifd: Network device 'eth5' link is down Thu Oct 8 20:21:46 2020 daemon.notice netifd: Interface 'lan' has link connectivity loss Thu Oct 8 20:21:46 2020 kern.info kernel: [ 2320.511840] r8152 3-5:1.0 eth5: carrier off Thu Oct 8 20:21:48 2020 daemon.info glorytun: starting glorytun vpn instance vpn Thu Oct 8 20:21:48 2020 user.notice omr-tracker: Launching... Thu Oct 8 20:21:48 2020 user.notice omr-tracker: Launched Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'lan' is now down Thu Oct 8 20:21:48 2020 daemon.debug dnsmasq[11128]: stopped listening on eth5(#28): 192.168.100.1 port 53 Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'lan' is disabled Thu Oct 8 20:21:48 2020 daemon.debug dnsmasq[11128]: stopped listening on eth5(#28): fd9b:2a5e:bd51::1 port 53 Thu Oct 8 20:21:48 2020 daemon.debug dnsmasq[11128]: stopped listening on eth5(#28): fe80::210:18ff:fe8c:92f8%eth5 port 53 Thu Oct 8 20:21:48 2020 kern.info kernel: [ 2322.022413] e1000e: eth4 NIC Link is Down Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'lan' is enabled Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'lan' has link connectivity Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'lan' is setting up now Thu Oct 8 20:21:48 2020 daemon.debug dnsmasq[11128]: listening on eth4(#13): 192.168.100.1 port 53 Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'lan' is now up Thu Oct 8 20:21:48 2020 daemon.notice netifd: Network device 'eth4' link is down Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'wan1' has link connectivity loss Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'lan' has link connectivity loss Thu Oct 8 20:21:48 2020 daemon.notice netifd: wan1 (28286): udhcpc: received SIGTERM Thu Oct 8 20:21:48 2020 daemon.notice netifd: wan1 (28286): udhcpc: unicasting a release of 192.168.10.114 to 192.168.10.1 Thu Oct 8 20:21:48 2020 daemon.notice netifd: wan1 (28286): udhcpc: sending release Thu Oct 8 20:21:48 2020 daemon.notice netifd: wan1 (28286): udhcpc: entering released state Thu Oct 8 20:21:48 2020 daemon.notice netifd: wan1 (28286): Command failed: Permission denied Thu Oct 8 20:21:48 2020 daemon.notice netifd: Interface 'wan1' is now down Thu Oct 8 20:21:48 2020 daemon.debug dnsmasq[11128]: stopped listening on eth4(#13): 192.168.10.114 port 53 Thu Oct 8 20:21:48 2020 kern.info kernel: [ 2322.184020] bnx2 0000:03:00.0 eth0: using MSIX Thu Oct 8 20:21:48 2020 user.notice firewall: Reloading firewall due to ifup of lan (eth4) Thu Oct 8 20:21:49 2020 daemon.info dnsmasq[11128]: read /etc/hosts - 4 addresses Thu Oct 8 20:21:49 2020 daemon.info dnsmasq[11128]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:21:49 2020 daemon.info dnsmasq-dhcp[11128]: read /etc/ethers - 0 addresses Thu Oct 8 20:21:49 2020 user.notice mptcp: Reloading mptcp config due to ifup of lan (eth4) Thu Oct 8 20:21:50 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 20:21:50 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 20:21:51 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 20:21:51 2020 user.notice omr-bypass: Restart dnsmasq... Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[11128]: exiting on receipt of SIGTERM Thu Oct 8 20:21:51 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Oct 8 20:21:51 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Oct 8 20:21:51 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: started, version 2.82 cachesize 150 Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Oct 8 20:21:51 2020 daemon.info dnsmasq-dhcp[3411]: DHCP, IP range 192.168.100.100 -- 192.168.100.249, lease time 12h Thu Oct 8 20:21:51 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain test Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain onion Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain localhost Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain local Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain invalid Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain bind Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain use-application-dns.net Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using only locally-known addresses for domain lan Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using nameserver 127.0.0.1#5353 Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: using 1 more local addresses Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: read /etc/hosts - 4 addresses Thu Oct 8 20:21:51 2020 daemon.info dnsmasq[3411]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:21:51 2020 daemon.info dnsmasq-dhcp[3411]: read /etc/ethers - 0 addresses Thu Oct 8 20:21:52 2020 daemon.notice netifd: Network device 'eth0' link is up Thu Oct 8 20:21:52 2020 daemon.notice netifd: Interface 'wan1' has link connectivity Thu Oct 8 20:21:52 2020 daemon.notice netifd: Interface 'wan1' is setting up now Thu Oct 8 20:21:52 2020 kern.info kernel: [ 2326.303544] bnx2 0000:03:00.0 eth0: NIC Copper Link is Up, 1000 Mbps full duplex Thu Oct 8 20:21:52 2020 daemon.notice netifd: wan1 (3689): udhcpc: started, v1.31.1 Thu Oct 8 20:21:52 2020 daemon.notice netifd: wan1 (3689): udhcpc: sending discover Thu Oct 8 20:21:53 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Operation timed out Thu Oct 8 20:21:53 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Operation timed out Thu Oct 8 20:21:53 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Operation timed out Thu Oct 8 20:21:55 2020 daemon.notice netifd: wan1 (3689): udhcpc: sending discover Thu Oct 8 20:21:57 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Host is unreachable Thu Oct 8 20:21:58 2020 daemon.notice netifd: wan1 (3689): udhcpc: sending discover Thu Oct 8 20:21:59 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 20:22:00 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Host is unreachable Thu Oct 8 20:22:00 2020 daemon.notice netifd: Network device 'eth4' link is up Thu Oct 8 20:22:00 2020 daemon.notice netifd: Interface 'lan' has link connectivity Thu Oct 8 20:22:00 2020 kern.info kernel: [ 2334.591938] e1000e: eth4 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: Rx/Tx Thu Oct 8 20:22:00 2020 kern.info kernel: [ 2334.592731] IPv6: ADDRCONF(NETDEV_CHANGE): eth4: link becomes ready Thu Oct 8 20:22:01 2020 daemon.info dnsmasq[3411]: read /etc/hosts - 4 addresses Thu Oct 8 20:22:01 2020 daemon.info dnsmasq[3411]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:22:01 2020 daemon.info dnsmasq-dhcp[3411]: read /etc/ethers - 0 addresses Thu Oct 8 20:22:02 2020 daemon.debug dnsmasq[3411]: listening on eth4(#13): fe80::210:18ff:fe8c:92f8%eth4 port 53 Thu Oct 8 20:22:02 2020 daemon.debug dnsmasq[3411]: listening on eth4(#13): fd9b:2a5e:bd51::1 port 53 Thu Oct 8 20:22:02 2020 user.notice post-tracking-post-tracking: wan1 down. Replace default route by 192.168.1.1 dev eth3 Thu Oct 8 20:22:03 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 20:22:03 2020 user.notice omr-bypass: Restart dnsmasq... Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[3411]: exiting on receipt of SIGTERM Thu Oct 8 20:22:03 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Oct 8 20:22:03 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Oct 8 20:22:03 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: started, version 2.82 cachesize 150 Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Oct 8 20:22:03 2020 daemon.info dnsmasq-dhcp[5463]: DHCP, IP range 192.168.100.100 -- 192.168.100.249, lease time 12h Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain test Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain onion Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain localhost Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain local Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain invalid Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain bind Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain use-application-dns.net Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using only locally-known addresses for domain lan Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using nameserver 127.0.0.1#5353 Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: using 1 more local addresses Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: read /etc/hosts - 4 addresses Thu Oct 8 20:22:03 2020 daemon.info dnsmasq[5463]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:22:03 2020 daemon.info dnsmasq-dhcp[5463]: read /etc/ethers - 0 addresses Thu Oct 8 20:22:03 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 20:22:05 2020 daemon.notice netifd: wan1 (3689): udhcpc: sending select for 192.168.10.114 Thu Oct 8 20:22:05 2020 daemon.notice netifd: wan1 (3689): udhcpc: lease of 192.168.10.114 obtained, lease time 86400 Thu Oct 8 20:22:05 2020 daemon.debug dnsmasq[5463]: listening on eth0(#9): 192.168.10.114 port 53 Thu Oct 8 20:22:05 2020 daemon.notice netifd: Interface 'wan1' is now up Thu Oct 8 20:22:05 2020 user.notice firewall: Reloading firewall due to ifup of wan1 (eth0) Thu Oct 8 20:22:06 2020 user.notice mptcp: Reloading mptcp config due to ifup of wan1 (eth0) Thu Oct 8 20:22:07 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 20:22:07 2020 user.notice omr-bypass: Restart dnsmasq... Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[5463]: exiting on receipt of SIGTERM Thu Oct 8 20:22:07 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Oct 8 20:22:07 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Oct 8 20:22:07 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: started, version 2.82 cachesize 150 Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Oct 8 20:22:07 2020 daemon.info dnsmasq-dhcp[7086]: DHCP, IP range 192.168.100.100 -- 192.168.100.249, lease time 12h Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain test Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain onion Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain localhost Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain local Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain invalid Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain bind Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain use-application-dns.net Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using only locally-known addresses for domain lan Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using nameserver 127.0.0.1#5353 Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: using 1 more local addresses Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: read /etc/hosts - 4 addresses Thu Oct 8 20:22:07 2020 daemon.info dnsmasq[7086]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:22:07 2020 daemon.info dnsmasq-dhcp[7086]: read /etc/ethers - 0 addresses Thu Oct 8 20:22:07 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 20:22:10 2020 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Thu Oct 8 20:23:01 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:23:01 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:23:01 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:23:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:23:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:23:01 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:23:01 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:23:01 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:23:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:23:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:23:01 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:28:01 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:28:01 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:28:01 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:28:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:28:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:28:01 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:28:01 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:28:01 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:28:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:28:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:28:01 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:33:01 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:33:01 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:33:01 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:33:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:33:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:33:01 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:33:01 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:33:01 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:33:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:33:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:33:01 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:36:58 2020 user.notice post-tracking-post-tracking: omrvpn down. Replace default route by 192.168.10.1 dev eth0 Thu Oct 8 20:36:58 2020 user.notice post-tracking-post-tracking: omrvpn down because gateway down Thu Oct 8 20:36:58 2020 user.notice post-tracking-post-tracking: Tunnel down use ShadowSocks for UDP Thu Oct 8 20:36:58 2020 user.notice Shadowsocks: Rules DOWN Thu Oct 8 20:36:59 2020 user.notice Shadowsocks: Rules UP Thu Oct 8 20:36:59 2020 user.notice Shadowsocks: Reload omr-bypass rules Thu Oct 8 20:36:59 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 20:36:59 2020 user.notice omr-bypass: Reload dnsmasq... Thu Oct 8 20:36:59 2020 daemon.info dnsmasq[7086]: read /etc/hosts - 4 addresses Thu Oct 8 20:36:59 2020 daemon.info dnsmasq[7086]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:36:59 2020 daemon.info dnsmasq-dhcp[7086]: read /etc/ethers - 0 addresses Thu Oct 8 20:36:59 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 20:37:13 2020 daemon.err glorytun[7585]: read: Operation timed out Thu Oct 8 20:37:13 2020 daemon.info glorytun[7585]: STOPPED tun0 Thu Oct 8 20:37:15 2020 daemon.err glorytun[7585]: 35.210.18.10.65001: connected Thu Oct 8 20:37:23 2020 user.notice post-tracking-post-tracking: wan2 (eth3) switched off because ping from 192.168.1.12 error (9.9.9.9,1.1.1.1) Thu Oct 8 20:37:23 2020 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3 Thu Oct 8 20:37:33 2020 daemon.err glorytun[7585]: 35.210.18.10.65001: key exchange failed Thu Oct 8 20:37:33 2020 daemon.info glorytun[7585]: STOPPED tun0 Thu Oct 8 20:37:33 2020 user.notice post-tracking-post-tracking: wan2 (eth3) switched up Thu Oct 8 20:37:33 2020 user.notice post-tracking-post-tracking: Set server VPS (35.210.18.10) route via 192.168.1.1 metric 4 Thu Oct 8 20:37:34 2020 daemon.err glorytun[7585]: 35.210.18.10.65001: connected Thu Oct 8 20:37:35 2020 daemon.info glorytun[7585]: STARTED tun0 Thu Oct 8 20:37:37 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Operation timed out Thu Oct 8 20:37:37 2020 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Thu Oct 8 20:37:52 2020 daemon.err /usr/bin/ss-redir[15647]: remote recv: Operation timed out Thu Oct 8 20:37:52 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Operation timed out Thu Oct 8 20:37:53 2020 user.notice OMR-VPS: Can't get token, try later (can't ping server, no server API answer) Thu Oct 8 20:37:53 2020 user.notice post-tracking-post-tracking: Tunnel up disable use of ShadowSocks for UDP Thu Oct 8 20:37:53 2020 user.notice Shadowsocks: Rules DOWN Thu Oct 8 20:37:54 2020 user.notice Shadowsocks: Rules UP Thu Oct 8 20:37:54 2020 user.notice Shadowsocks: Reload omr-bypass rules Thu Oct 8 20:37:54 2020 user.notice omr-bypass: Starting OMR-ByPass... Thu Oct 8 20:37:54 2020 user.notice omr-bypass: Reload dnsmasq... Thu Oct 8 20:37:54 2020 daemon.info dnsmasq[7086]: read /etc/hosts - 4 addresses Thu Oct 8 20:37:54 2020 daemon.info dnsmasq[7086]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Thu Oct 8 20:37:54 2020 daemon.info dnsmasq-dhcp[7086]: read /etc/ethers - 0 addresses Thu Oct 8 20:37:54 2020 user.notice omr-bypass: OMR-ByPass is running Thu Oct 8 20:38:01 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:38:01 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:38:01 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:38:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:38:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:38:01 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:38:01 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:38:01 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:38:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:38:01 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:38:01 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:38:41 2020 daemon.err /usr/bin/ss-redir[15648]: remote recv: Operation timed out Thu Oct 8 20:39:19 2020 daemon.err /usr/bin/ss-redir[15647]: server recv: Operation timed out Thu Oct 8 20:43:01 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:43:01 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:43:01 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:43:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:43:01 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:43:02 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:43:02 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:43:02 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:43:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:43:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:43:02 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:47:28 2020 daemon.info dnsmasq-dhcp[7086]: DHCPREQUEST(eth4) 192.168.100.230 00:26:f2:b8:33:cd Thu Oct 8 20:47:28 2020 daemon.info dnsmasq-dhcp[7086]: DHCPACK(eth4) 192.168.100.230 00:26:f2:b8:33:cd Thu Oct 8 20:48:02 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:48:02 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:48:02 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:48:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:48:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:48:02 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:48:02 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:48:02 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:48:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:48:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:48:02 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:49:25 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 20:53:02 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:53:02 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:53:02 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:53:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:53:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:53:02 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:53:02 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:53:02 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:53:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:53:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:53:02 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 20:58:02 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 20:58:02 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 20:58:02 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:58:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 20:58:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 20:58:02 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 20:58:02 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 20:58:02 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 20:58:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 20:58:02 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 20:58:02 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 21:03:02 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 21:03:02 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 21:03:02 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:03:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 21:03:02 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:03:03 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 21:03:03 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 21:03:03 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 21:03:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 21:03:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 21:03:03 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 21:04:41 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 21:07:13 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 21:07:14 2020 daemon.err /usr/bin/ss-redir[15648]: server recv: Operation timed out Thu Oct 8 21:08:03 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 21:08:03 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 21:08:03 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:08:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 21:08:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:08:03 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 21:08:03 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 21:08:03 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 21:08:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 21:08:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 21:08:03 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 21:13:03 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 21:13:03 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 21:13:03 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:13:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 21:13:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:13:03 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 21:13:03 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 21:13:03 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 21:13:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 21:13:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 21:13:03 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 21:18:03 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 21:18:03 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 21:18:03 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:18:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 21:18:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:18:03 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 21:18:03 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 21:18:03 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 21:18:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 21:18:03 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 21:18:03 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting Thu Oct 8 21:23:03 2020 daemon.warn openvpn(wan3)[12415]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Oct 8 21:23:03 2020 daemon.warn openvpn(wan3)[12415]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 8 21:23:03 2020 daemon.notice openvpn(wan3)[12415]: TCP/UDP: Preserving recently used remote address: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:23:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link local (bound): [AF_INET][undef]:65301 Thu Oct 8 21:23:03 2020 daemon.notice openvpn(wan3)[12415]: UDP link remote: [AF_INET]54.38.188.175:65301 Thu Oct 8 21:23:04 2020 daemon.err openvpn(wan3)[12415]: VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: CN=ChangeMe Thu Oct 8 21:23:04 2020 daemon.err openvpn(wan3)[12415]: OpenSSL: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed Thu Oct 8 21:23:04 2020 daemon.err openvpn(wan3)[12415]: TLS_ERROR: BIO read tls_read_plaintext error Thu Oct 8 21:23:04 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS object -> incoming plaintext read error Thu Oct 8 21:23:04 2020 daemon.err openvpn(wan3)[12415]: TLS Error: TLS handshake failed Thu Oct 8 21:23:04 2020 daemon.notice openvpn(wan3)[12415]: SIGUSR1[soft,tls-error] received, process restarting

AdrienDssy commented 4 years ago

Je tiens à ajouter que WAN3 n'existe pas

Ysurac commented 4 years ago

Il y a donc un soucis de configuration. On dirait un MPTCP over VPN qui a été activé peut être sur une interface supprimé, il va falloir que j'ajoute un check pour ce genre de cas.

AdrienDssy commented 4 years ago

Comment je peux le retirer vu que c'est pas visible ?

Ysurac commented 4 years ago

Il doit être visible dans VPN->OpenVPN

AdrienDssy commented 4 years ago

Effectivement

AdrienDssy commented 4 years ago

Mais en tout cas les soucis de timeout sont toujours présent mon serveur mail a du mal avec Google et cie

Ysurac commented 4 years ago

Il faut regarder encore le journal système voir si il n'y a pas autre chose.

AdrienDssy commented 4 years ago

Non rien de plus mise à part une requête DHCP pour un autre équipement

Thu Oct 8 21:45:03 2020 daemon.notice openvpn(wan3)[25718]: SIGTERM[hard,init_instance] received, process exiting Thu Oct 8 21:47:48 2020 daemon.info dnsmasq-dhcp[7086]: DHCPREQUEST(eth4) 192.168.100.177 ec:41:18:1c:fd:f5 Thu Oct 8 21:47:48 2020 daemon.info dnsmasq-dhcp[7086]: DHCPACK(eth4) 192.168.100.177 ec:41:18:1c:fd:f5 MiWiFi-R4CM Thu Oct 8 21:47:52 2020 daemon.info dnsmasq-dhcp[7086]: DHCPREQUEST(eth4) 192.168.100.230 00:26:f2:b8:33:cd Thu Oct 8 21:47:52 2020 daemon.info dnsmasq-dhcp[7086]: DHCPACK(eth4) 192.168.100.230 00:26:f2:b8:33:cd

AdrienDssy commented 4 years ago

Je suis retourner chez OVH et c'est bien mieux, j'ignore pourquoi ça merdais côté Google alors que tout les ports étaient ouvert.

ça me fait souvent ce soucis de VPN côté OVH alors que maintenant j'atteint les 30-70mbits (selon l'heure dans la journée)

Les clef VPS ont été vérifiées au préalable.

Fri Oct 9 14:39:45 2020 user.notice omr-tracker: Launching... Fri Oct 9 14:39:45 2020 user.notice omr-tracker: Launched Fri Oct 9 14:39:45 2020 daemon.info glorytun: starting glorytun vpn instance vpn Fri Oct 9 14:39:45 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:39:45 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:39:45 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:39:46 2020 user.notice omr-bypass: Starting OMR-ByPass... Fri Oct 9 14:39:46 2020 user.notice omr-bypass: Restart dnsmasq... Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[23271]: exiting on receipt of SIGTERM Fri Oct 9 14:39:46 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Fri Oct 9 14:39:46 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Fri Oct 9 14:39:46 2020 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: started, version 2.82 cachesize 150 Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Fri Oct 9 14:39:46 2020 daemon.info dnsmasq-dhcp[26298]: DHCP, IP range 192.168.100.100 -- 192.168.100.249, lease time 12h Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain test Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain onion Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain localhost Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain local Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain invalid Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain bind Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using nameserver 8.4.4.8#53 Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using nameserver 8.8.8.8#53 Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using nameserver 1.0.0.1#53 Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using nameserver 1.1.1.1#53 Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain use-application-dns.net Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using only locally-known addresses for domain lan Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: using 1 more local addresses Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: read /etc/hosts - 4 addresses Fri Oct 9 14:39:46 2020 daemon.info dnsmasq[26298]: read /tmp/hosts/dhcp.cfg01411c - 3 addresses Fri Oct 9 14:39:46 2020 daemon.info dnsmasq-dhcp[26298]: read /etc/ethers - 0 addresses Fri Oct 9 14:39:46 2020 user.notice omr-bypass: OMR-ByPass is running Fri Oct 9 14:39:47 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:39:47 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:39:47 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:39:47 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:39:48 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:39:48 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:39:48 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:39:49 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:39:49 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:39:50 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:39:51 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:39:51 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:39:59 2020 user.notice post-tracking-post-tracking: omrvpn down because gateway down Fri Oct 9 14:39:59 2020 user.notice post-tracking-post-tracking: omrvpn down. Replace default route by 192.168.10.1 dev eth0 Fri Oct 9 14:40:02 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:02 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:02 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:14 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:14 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:14 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:14 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:15 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:15 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:19 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:20 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:20 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:23 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:23 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:23 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:25 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:25 2020 daemon.err /usr/bin/ss-redir[19703]: remote recv: Connection reset by peer Fri Oct 9 14:40:25 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:25 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:26 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:26 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:26 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:27 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:27 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:27 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:28 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:28 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:28 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:29 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:29 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:29 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:30 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:30 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:30 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:31 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:31 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:31 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:32 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:32 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:32 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:33 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:33 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:33 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:34 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:34 2020 daemon.err /usr/bin/ss-redir[19704]: server recv: Operation timed out Fri Oct 9 14:40:34 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:34 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:35 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:35 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:35 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:37 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:37 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:37 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:38 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:38 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:38 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:39 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:39 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:39 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:40 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:40 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:40 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:41 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:41 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:41 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:42 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:42 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:42 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:43 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:43 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:43 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:45 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:45 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:45 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:46 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:46 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:46 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:47 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:47 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:47 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:48 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:48 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:48 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:49 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:49 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:49 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:50 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:50 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:50 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:51 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:51 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:51 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:54 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:54 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:54 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:55 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:55 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:55 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:56 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:56 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:56 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:58 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:58 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:58 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:40:59 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:40:59 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:40:59 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:00 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:00 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:00 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:01 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:01 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:01 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:02 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:02 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:02 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:03 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:03 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:03 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:05 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:05 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:05 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:06 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:06 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:06 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:07 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:07 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:07 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:08 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:08 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:08 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:09 2020 daemon.err /usr/bin/ss-redir[19703]: remote recv: Operation timed out Fri Oct 9 14:41:09 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:09 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:09 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:10 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:10 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:10 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:11 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:12 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:12 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:13 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:13 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:13 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:13 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:14 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:14 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:15 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:15 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:15 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:16 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:16 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:16 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:18 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:18 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:18 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:18 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:19 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:19 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:19 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:20 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:20 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:22 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:22 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:22 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:24 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:24 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:24 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:24 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:25 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:25 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:26 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:26 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:26 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:27 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:27 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:27 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:29 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:29 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:29 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:29 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:30 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:30 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:30 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:31 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:31 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:32 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:32 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:32 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:33 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:33 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:33 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:34 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:34 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:34 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:35 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:35 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:35 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:36 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:36 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:36 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:37 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:37 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:37 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:38 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:39 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:39 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:39 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:39 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:39 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:40 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:40 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:40 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:41 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected Fri Oct 9 14:41:41 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: key exchange failed Fri Oct 9 14:41:41 2020 daemon.info glorytun[20155]: STOPPED tun0 Fri Oct 9 14:41:42 2020 daemon.err glorytun[20155]: 54.38.188.175.65001: connected