Ysurac / openmptcprouter

OpenMPTCProuter is an open source solution to aggregate multiple internet connections using Multipath TCP (MPTCP) on OpenWrt
https://www.openmptcprouter.com/
GNU General Public License v3.0
1.86k stars 270 forks source link

Can't Contact Server Admin Script #1785

Closed ccmks closed 3 years ago

ccmks commented 3 years ago

Expected Behavior

Everything is working with all green check instead of yellow exclamation mark on OMR Status page

Current Behavior

image

Possible Solution

No idea

Steps to Reproduce the Problem

It was working fine for several days until we get this for no apparent reason!

Context (Environment)

N/A

Specifications

Ysurac commented 3 years ago

What is this 27.112.xxx IP from ? Check in State->System log why it can't contact VPS API.

ccmks commented 3 years ago

What is this 27.112.xxx IP from ? - Indonesian VPS

It is working now by itself so I am not sure what happened. But I do know that it is happening intermittently. At least it has been doing it 3 times a week, so not sure if go to system log will be relevant?

Ysurac commented 3 years ago

Yes you should check in system log if a VPS problem is detected when there is the problem. Possible that the latency between connections and VPS is sometimes too high or some packets lost.

ccmks commented 3 years ago

Here is the system log:

Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:08:34 2021 daemon.warn openvpn(wan3)[7347]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:08:34 2021 daemon.warn openvpn(wan3)[7347]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:08:34 2021 daemon.err openvpn(wan3)[7347]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: Exiting due to fatal error Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:08:39 2021 daemon.err openvpn(wan3)[7967]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: Exiting due to fatal error Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:08:44 2021 daemon.err openvpn(wan3)[9275]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: Exiting due to fatal error Mon Apr 26 21:08:45 2021 user.notice omr-bypass: Starting OMR-ByPass... Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:08:49 2021 daemon.err openvpn(wan3)[10927]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: Exiting due to fatal error Mon Apr 26 21:08:49 2021 user.notice omr-bypass: Restart dnsmasq... Mon Apr 26 21:08:49 2021 daemon.info dnsmasq[4254]: exiting on receipt of SIGTERM Mon Apr 26 21:08:49 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Mon Apr 26 21:08:49 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Mon Apr 26 21:08:49 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: started, version 2.82 cachesize 150 Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: DNS service limited to local subnets Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Mon Apr 26 21:08:50 2021 daemon.info dnsmasq-dhcp[11039]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain test Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain onion Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain localhost Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain local Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain invalid Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain bind Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain use-application-dns.net Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain lan Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using nameserver 127.0.0.1#5353 Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using 1 more local addresses Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: read /etc/hosts - 4 addresses Mon Apr 26 21:08:50 2021 user.notice omr-bypass: OMR-ByPass is running Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Mon Apr 26 21:08:50 2021 daemon.info dnsmasq-dhcp[11039]: read /etc/ethers - 0 addresses Mon Apr 26 21:08:51 2021 daemon.info glorytun: starting glorytun vpn instance vpn Mon Apr 26 21:08:52 2021 user.notice omr-tracker: Launching... Mon Apr 26 21:08:52 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:08:52 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:08:54 2021 daemon.err openvpn(wan3)[12444]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: Exiting due to fatal error Mon Apr 26 21:08:54 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:08:55 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:08:55 2021 daemon.err openvpn(wan3)[12613]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: Exiting due to fatal error Mon Apr 26 21:08:57 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:08:57 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:08:57 2021 daemon.err openvpn(wan3)[13026]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: Exiting due to fatal error Mon Apr 26 21:08:57 2021 user.notice omr-tracker: Launched Mon Apr 26 21:08:58 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:02 2021 daemon.err openvpn(wan3)[14672]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: Exiting due to fatal error Mon Apr 26 21:09:03 2021 user.notice omr-tracker: Launching... Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:07 2021 daemon.err openvpn(wan3)[15658]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: Exiting due to fatal error Mon Apr 26 21:09:07 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:09:08 2021 user.notice omr-tracker: Launched Mon Apr 26 21:09:09 2021 daemon.info glorytun: starting glorytun vpn instance vpn Mon Apr 26 21:09:10 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:09:10 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:10 2021 daemon.err openvpn(wan3)[17100]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: Exiting due to fatal error Mon Apr 26 21:09:11 2021 user.notice omr-bypass: Starting OMR-ByPass... Mon Apr 26 21:09:12 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:09:15 2021 user.notice omr-bypass: Restart dnsmasq... Mon Apr 26 21:09:15 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[11039]: exiting on receipt of SIGTERM Mon Apr 26 21:09:15 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:09:15 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Mon Apr 26 21:09:15 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Mon Apr 26 21:09:15 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: started, version 2.82 cachesize 150 Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: DNS service limited to local subnets Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Mon Apr 26 21:09:15 2021 daemon.info dnsmasq-dhcp[19498]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain test Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain onion Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain localhost Mon Apr 26 21:09:15 2021 user.notice omr-bypass: OMR-ByPass is running Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain local Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain invalid Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain bind Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain use-application-dns.net Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain lan Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using nameserver 127.0.0.1#5353 Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using 1 more local addresses Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: read /etc/hosts - 4 addresses Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Mon Apr 26 21:09:15 2021 daemon.info dnsmasq-dhcp[19498]: read /etc/ethers - 0 addresses Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:15 2021 daemon.err openvpn(wan3)[19584]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: Exiting due to fatal error Mon Apr 26 21:09:16 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:09:16 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:16 2021 daemon.err openvpn(wan3)[19858]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: Exiting due to fatal error Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:21 2021 daemon.err openvpn(wan3)[20792]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: Exiting due to fatal error Mon Apr 26 21:09:22 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:09:22 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:22 2021 daemon.err openvpn(wan3)[20942]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: Exiting due to fatal error Mon Apr 26 21:09:26 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:09:27 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12) Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:27 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3 Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:27 2021 daemon.err openvpn(wan3)[21527]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: Exiting due to fatal error Mon Apr 26 21:09:29 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:09:29 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:29 2021 daemon.err openvpn(wan3)[22061]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: Exiting due to fatal error Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:34 2021 daemon.err openvpn(wan3)[22174]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: Exiting due to fatal error Mon Apr 26 21:09:38 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:39 2021 daemon.err openvpn(wan3)[22931]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: Exiting due to fatal error Mon Apr 26 21:09:41 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:09:41 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:41 2021 daemon.err openvpn(wan3)[23215]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: Exiting due to fatal error Mon Apr 26 21:09:45 2021 user.notice omr-bypass: Starting OMR-ByPass... Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:46 2021 daemon.err openvpn(wan3)[24702]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: Exiting due to fatal error Mon Apr 26 21:09:49 2021 user.notice omr-bypass: Restart dnsmasq... Mon Apr 26 21:09:49 2021 daemon.info dnsmasq[19498]: exiting on receipt of SIGTERM Mon Apr 26 21:09:49 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Mon Apr 26 21:09:49 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Mon Apr 26 21:09:49 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: started, version 2.82 cachesize 150 Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: DNS service limited to local subnets Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Mon Apr 26 21:09:50 2021 user.notice omr-bypass: OMR-ByPass is running Mon Apr 26 21:09:50 2021 daemon.info dnsmasq-dhcp[25717]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain test Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain onion Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain localhost Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain local Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain invalid Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain bind Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain use-application-dns.net Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain lan Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using nameserver 127.0.0.1#5353 Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using 1 more local addresses Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: read /etc/hosts - 4 addresses Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Mon Apr 26 21:09:50 2021 daemon.info dnsmasq-dhcp[25717]: read /etc/ethers - 0 addresses Mon Apr 26 21:09:51 2021 daemon.info glorytun: starting glorytun vpn instance vpn Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:51 2021 daemon.err openvpn(wan3)[26638]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: Exiting due to fatal error Mon Apr 26 21:09:52 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:09:52 2021 user.notice omr-tracker: Launching... Mon Apr 26 21:09:54 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:09:54 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:09:55 2021 daemon.err openvpn(wan3)[27499]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: Exiting due to fatal error Mon Apr 26 21:09:57 2021 user.notice omr-tracker: Launched Mon Apr 26 21:09:59 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Mon Apr 26 21:09:59 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:00 2021 daemon.err openvpn(wan3)[28396]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: Exiting due to fatal error Mon Apr 26 21:10:03 2021 user.notice omr-tracker: Launching... Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:05 2021 daemon.err openvpn(wan3)[29793]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: Exiting due to fatal error Mon Apr 26 21:10:06 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:10:06 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:07 2021 daemon.err openvpn(wan3)[30039]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: Exiting due to fatal error Mon Apr 26 21:10:08 2021 user.notice omr-tracker: Launched Mon Apr 26 21:10:09 2021 daemon.info glorytun: starting glorytun vpn instance vpn Mon Apr 26 21:10:10 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:10:11 2021 user.notice omr-bypass: Starting OMR-ByPass... Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:12 2021 daemon.err openvpn(wan3)[32449]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: Exiting due to fatal error Mon Apr 26 21:10:12 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:10:13 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:10:13 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:13 2021 daemon.err openvpn(wan3)[414]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: Exiting due to fatal error Mon Apr 26 21:10:14 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:10:15 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0 Mon Apr 26 21:10:15 2021 user.notice omr-bypass: Restart dnsmasq... Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[25717]: exiting on receipt of SIGTERM Mon Apr 26 21:10:15 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Mon Apr 26 21:10:15 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Mon Apr 26 21:10:15 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: started, version 2.82 cachesize 150 Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: DNS service limited to local subnets Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Mon Apr 26 21:10:15 2021 daemon.info dnsmasq-dhcp[1705]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h Mon Apr 26 21:10:15 2021 user.notice omr-bypass: OMR-ByPass is running Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain test Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain onion Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain localhost Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain local Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain invalid Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain bind Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain use-application-dns.net Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain lan Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using nameserver 127.0.0.1#5353 Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using 1 more local addresses Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: read /etc/hosts - 4 addresses Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Mon Apr 26 21:10:15 2021 daemon.info dnsmasq-dhcp[1705]: read /etc/ethers - 0 addresses Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:18 2021 daemon.err openvpn(wan3)[2519]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: Exiting due to fatal error Mon Apr 26 21:10:18 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:10:18 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:18 2021 daemon.err openvpn(wan3)[2711]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: Exiting due to fatal error Mon Apr 26 21:10:20 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:10:21 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:21 2021 daemon.err openvpn(wan3)[3137]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: Exiting due to fatal error Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:26 2021 daemon.err openvpn(wan3)[3583]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: Exiting due to fatal error Mon Apr 26 21:10:27 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12) Mon Apr 26 21:10:27 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3 Mon Apr 26 21:10:29 2021 user.notice post-tracking-post-tracking: Check API configuration... Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:31 2021 daemon.err openvpn(wan3)[4455]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: Exiting due to fatal error Mon Apr 26 21:10:32 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Mon Apr 26 21:10:32 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:32 2021 daemon.err openvpn(wan3)[4611]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: Exiting due to fatal error Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Mon Apr 26 21:10:37 2021 daemon.err openvpn(wan3)[4789]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: Exiting due to fatal error

ccmks commented 3 years ago

Got same error again. But in this case the WAN1 is down due to outage. Although the bonding is not working, at least the user can still getting internet connection from single WAN (The user has 2 WAN only and WAN1 is currently down). In this case, if the WAN1 is down, the user can't access internet

Thu Apr 29 13:08:13 2021 daemon.notice openvpn(wan3)[27619]: Exiting due to fatal error Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:18 2021 daemon.err openvpn(wan3)[27745]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: Exiting due to fatal error Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:23 2021 daemon.err openvpn(wan3)[27854]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: Exiting due to fatal error Thu Apr 29 13:08:26 2021 user.notice post-tracking-post-tracking: Check API configuration... Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:28 2021 daemon.err openvpn(wan3)[28051]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: Exiting due to fatal error Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:33 2021 daemon.err openvpn(wan3)[28332]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: Exiting due to fatal error Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:38 2021 daemon.err openvpn(wan3)[28588]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: Exiting due to fatal error Thu Apr 29 13:08:43 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer) Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:43 2021 daemon.err openvpn(wan3)[28751]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: Exiting due to fatal error Thu Apr 29 13:08:43 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Thu Apr 29 13:08:43 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:43 2021 daemon.err openvpn(wan3)[28849]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: Exiting due to fatal error Thu Apr 29 13:08:44 2021 daemon.err glorytun[2561]: read: Connection reset by peer Thu Apr 29 13:08:44 2021 daemon.info glorytun[2561]: STOPPED tun0 Thu Apr 29 13:08:45 2021 daemon.err glorytun[2561]: 27.112.X.X.65001: connected Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:48 2021 daemon.err openvpn(wan3)[29024]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: Exiting due to fatal error Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:53 2021 daemon.err openvpn(wan3)[29517]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: Exiting due to fatal error Thu Apr 29 13:08:55 2021 daemon.err glorytun[2561]: 27.112.X.X.65001: key exchange failed Thu Apr 29 13:08:55 2021 daemon.info glorytun[2561]: STOPPED tun0 Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:08:58 2021 daemon.err openvpn(wan3)[29762]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: Exiting due to fatal error Thu Apr 29 13:08:59 2021 user.notice post-tracking-post-tracking: omrvpn down because gateway down Thu Apr 29 13:08:59 2021 daemon.err omr-tracker[24407]: Failed to send request: Operation not permitted Thu Apr 29 13:08:59 2021 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it Thu Apr 29 13:08:59 2021 daemon.notice netifd: Network device 'tun0' link is down Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is now down Thu Apr 29 13:08:59 2021 daemon.err glorytun[2561]: getpeername: Socket not connected Thu Apr 29 13:08:59 2021 daemon.debug dnsmasq[23963]: stopped listening on tun0(#25): 10.255.255.2 port 53 Thu Apr 29 13:08:59 2021 daemon.info glorytun: starting glorytun vpn instance vpn Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: remove network interface tun0: event processed Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: event reported: action=remove, name=tun0, subsystem=net Thu Apr 29 13:08:59 2021 daemon.info glorytun[30074]: INITIALIZED tun0 Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is disabled Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is enabled Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is disabled Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is enabled Thu Apr 29 13:08:59 2021 daemon.notice netifd: Network device 'tun0' link is up Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is setting up now Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is now up Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: add network interface tun0: event processed Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: error: parent device sysfspath not found Thu Apr 29 13:09:00 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0) Thu Apr 29 13:09:00 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 13:09:02 2021 authpriv.info dropbear[31506]: Child connection from 192.168.120.224:50067 Thu Apr 29 13:09:02 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 13:09:03 2021 daemon.info dnsmasq[23963]: read /etc/hosts - 4 addresses Thu Apr 29 13:09:03 2021 daemon.info dnsmasq[23963]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 13:09:03 2021 daemon.info dnsmasq-dhcp[23963]: read /etc/ethers - 0 addresses Thu Apr 29 13:09:03 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 13:09:03 2021 user.notice Shadowsocks: Rules UP Thu Apr 29 13:09:03 2021 user.notice Shadowsocks: Reload omr-bypass rules Thu Apr 29 13:09:03 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:03 2021 daemon.err openvpn(wan3)[31988]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: Exiting due to fatal error Thu Apr 29 13:09:06 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 13:09:06 2021 daemon.info dnsmasq[23963]: read /etc/hosts - 4 addresses Thu Apr 29 13:09:06 2021 daemon.info dnsmasq[23963]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 13:09:06 2021 daemon.info dnsmasq-dhcp[23963]: read /etc/ethers - 0 addresses Thu Apr 29 13:09:06 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 13:09:06 2021 daemon.debug dnsmasq[23963]: listening on tun0(#26): 10.255.255.2 port 53 Thu Apr 29 13:09:07 2021 authpriv.notice dropbear[31506]: Password auth succeeded for 'root' from 192.168.120.224:50067 Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:08 2021 daemon.err openvpn(wan3)[625]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: Exiting due to fatal error Thu Apr 29 13:09:09 2021 daemon.err /usr/bin/ss-redir[25364]: remote recv: Host is unreachable Thu Apr 29 13:09:10 2021 daemon.info omr-tracker-ss: Shadowsocks is down (can't contact via http 1.0.0.1, 212.27.48.10, 198.27.92.1, 151.101.129.164, 77.88.55.77, 1.1.1.1, 74.82.42.42) Thu Apr 29 13:09:11 2021 user.notice Shadowsocks: Rules DOWN Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:13 2021 daemon.err openvpn(wan3)[998]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: Exiting due to fatal error Thu Apr 29 13:09:15 2021 daemon.err /usr/bin/ss-redir[25364]: remote recv: Host is unreachable Thu Apr 29 13:09:16 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:09:17 2021 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0) Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:18 2021 daemon.err openvpn(wan3)[1465]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: Exiting due to fatal error Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:23 2021 daemon.err openvpn(wan3)[1589]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: Exiting due to fatal error Thu Apr 29 13:09:27 2021 daemon.info omr-tracker-ss: Server (27.112.X.X) seems down, no answer to ping Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:28 2021 daemon.err openvpn(wan3)[1702]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: Exiting due to fatal error Thu Apr 29 13:09:29 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:34 2021 daemon.err openvpn(wan3)[2172]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: Exiting due to fatal error Thu Apr 29 13:09:37 2021 user.notice post-tracking-post-tracking: Check API configuration... Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:39 2021 daemon.err openvpn(wan3)[2372]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: Exiting due to fatal error Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:44 2021 daemon.err openvpn(wan3)[2490]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: Exiting due to fatal error Thu Apr 29 13:09:48 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:49 2021 daemon.err openvpn(wan3)[2595]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: Exiting due to fatal error Thu Apr 29 13:09:53 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer) Thu Apr 29 13:09:53 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Thu Apr 29 13:09:53 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:54 2021 daemon.err openvpn(wan3)[2970]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: Exiting due to fatal error Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:09:59 2021 daemon.err openvpn(wan3)[3123]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: Exiting due to fatal error Thu Apr 29 13:10:03 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:04 2021 daemon.err openvpn(wan3)[3506]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: Exiting due to fatal error Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:09 2021 daemon.err openvpn(wan3)[3646]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: Exiting due to fatal error Thu Apr 29 13:10:09 2021 daemon.err omr-tracker[24407]: Failed to send request: Operation not permitted Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:14 2021 daemon.err openvpn(wan3)[3940]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: Exiting due to fatal error Thu Apr 29 13:10:17 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:19 2021 daemon.err openvpn(wan3)[4058]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: Exiting due to fatal error Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:24 2021 daemon.err openvpn(wan3)[4172]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: Exiting due to fatal error Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:29 2021 daemon.err openvpn(wan3)[4292]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: Exiting due to fatal error Thu Apr 29 13:10:33 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:34 2021 daemon.err openvpn(wan3)[4588]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: Exiting due to fatal error Thu Apr 29 13:10:38 2021 user.notice post-tracking-post-tracking: Check API configuration... Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:39 2021 daemon.err openvpn(wan3)[4780]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: Exiting due to fatal error Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:44 2021 daemon.err openvpn(wan3)[4907]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: Exiting due to fatal error Thu Apr 29 13:10:47 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer) Thu Apr 29 13:10:47 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Thu Apr 29 13:10:47 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:47 2021 daemon.notice openvpn(wan3)[5058]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:47 2021 daemon.notice openvpn(wan3)[5058]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:48 2021 daemon.notice openvpn(wan3)[5058]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:48 2021 daemon.err openvpn(wan3)[5058]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:48 2021 daemon.notice openvpn(wan3)[5058]: Exiting due to fatal error Thu Apr 29 13:10:48 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:53 2021 daemon.err openvpn(wan3)[5169]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: Exiting due to fatal error Thu Apr 29 13:10:53 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:10:58 2021 daemon.err openvpn(wan3)[5565]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: Exiting due to fatal error Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:11:03 2021 daemon.err openvpn(wan3)[5701]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: Exiting due to fatal error Thu Apr 29 13:11:03 2021 daemon.err omr-tracker[24407]: Failed to send request: Operation not permitted Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:11:08 2021 daemon.err openvpn(wan3)[5789]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: Exiting due to fatal error Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:11:13 2021 daemon.err openvpn(wan3)[5878]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: Exiting due to fatal error Thu Apr 29 13:11:14 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:11:18 2021 daemon.err openvpn(wan3)[6009]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: Exiting due to fatal error Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 13:11:23 2021 daemon.err openvpn(wan3)[6121]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: Exiting due to fatal error

ccmks commented 3 years ago

Here is the settings of my OMR

Dashboard Status Overview Firewall Routes System Log Kernel Log Processes Realtime Graphs vnStat Traffic Monitor System OpenMPTCProuter System Administration ACL Settings Software Startup Scheduled Tasks Mount Points Backup / Flash Firmware Reboot Shutdown Services OMR-Tracker iPerf Proxy DNS Over HTTPS Shadowsocks-libev OMR-Bypass Packet Capture E-Mail Wake on LAN Terminal uHTTPd UPnP Recursive DNS Network MPTCP Interfaces DHCP and DNS Hostnames Static Routes SQM QoS Firewall Diagnostics OMR-DSCP Quota SNMPd VPN MLVPN Glorytun TCP Glorytun UDP DSVPN OpenVPN Logout Settings Wizard Status Advanced Settings Backup on server Show all settings All router settings dhcp.@dnsmasq[0]=dnsmasq dhcp.@dnsmasq[0].domainneeded='1' dhcp.@dnsmasq[0].boguspriv='1' dhcp.@dnsmasq[0].filterwin2k='0' dhcp.@dnsmasq[0].localise_queries='1' dhcp.@dnsmasq[0].rebind_protection='1' dhcp.@dnsmasq[0].rebind_localhost='1' dhcp.@dnsmasq[0].local='/lan/' dhcp.@dnsmasq[0].domain='lan' dhcp.@dnsmasq[0].expandhosts='1' dhcp.@dnsmasq[0].authoritative='1' dhcp.@dnsmasq[0].readethers='1' dhcp.@dnsmasq[0].leasefile='/tmp/dhcp.leases' dhcp.@dnsmasq[0].resolvfile='/tmp/resolv.conf.d/resolv.conf.auto' dhcp.@dnsmasq[0].nonwildcard='1' dhcp.@dnsmasq[0].localservice='1' dhcp.@dnsmasq[0].ednspacket_max='1232' dhcp.@dnsmasq[0].server='127.0.0.1#5353' '/lan/' '/use-application-dns.net/' dhcp.@dnsmasq[0].noresolv='1' dhcp.@dnsmasq[0].nonegcache='1' dhcp.@dnsmasq[0].rebind_domain='plex.direct' dhcp.@dnsmasq[0].ipset='/mmg-fna.whatsapp.net/omr_dscp-cs1,omr_dscp6-cs1' '/googlevideo.com/omr_dscp-cs4,omr_dscp6-cs4' '/upload.youtube.com/omr_dscp-cs1,omr_dscp6-cs1' '/nflxvideo.net/omr_dscp-cs4,omr_dscp6-cs4' '/upload.video.google.com/omr_dscp-cs1,omr_dscp6-cs1' '/s3.ll.dash.row.aiv-cdn.net/omr_dscp-cs4,omr_dscp6-cs4' '/windowsupdate.com/omr_dscp-cs1,omr_dscp6-cs1' '/d25xi40x97liuc.cloudfront.net/omr_dscp-cs4,omr_dscp6-cs4' '/update.microsoft.com/omr_dscp-cs1,omr_dscp6-cs1' '/aiv-delivery.net/omr_dscp-cs4,omr_dscp6-cs4' '/vevo.com/omr_dscp-cs4,omr_dscp6-cs4' '/audio-fa.scdn.com/omr_dscp-cs4,omr_dscp6-cs4' '/deezer.com/omr_dscp-cs4,omr_dscp6-cs4' '/sndcdn.com/omr_dscp-cs4,omr_dscp6-cs4' '/last.fm/omr_dscp-cs4,omr_dscp6-cs4' '/v.redd.it/omr_dscp-cs4,omr_dscp6-cs4' '/ttvnw.net/omr_dscp-cs4,omr_dscp6-cs4,omr_dscp-cs4,omr_dscp6-cs4' '/googletagmanager.com/omr_dscp-cs2,omr_dscp6-cs2' '/googleusercontent.com/omr_dscp-cs2,omr_dscp6-cs2' '/google.com/omr_dscp-cs2,omr_dscp6-cs2' '/fbcdn.net/omr_dscp-cs4,omr_dscp6-cs4,omr_dscp-cs2,omr_dscp6-cs2' '/akamaihd.net/omr_dscp-cs2,omr_dscp6-cs2' '/whatsapp.net/omr_dscp-cs2,omr_dscp6-cs2' '/whatsapp.com/omr_dscp-cs2,omr_dscp6-cs2' '/googleapis.com/omr_dscp-cs2,omr_dscp6-cs2' '/1e100.net/omr_dscp-cs2,omr_dscp6-cs2' '/hwcdn.net/omr_dscp-cs2,omr_dscp6-cs2' '/download.qq.com/omr_dscp-cs1,omr_dscp6-cs1' '/steamcontent.com/omr_dscp-cs1,omr_dscp6-cs1' '/gs2.ww.prod.dl.playstation.net/omr_dscp-cs1,omr_dscp6-cs1' '/dropbox.com/omr_dscp-cs1,omr_dscp6-cs1' '/dropboxstatic.com/omr_dscp-cs1,omr_dscp6-cs1' '/dropbox-dns.com/omr_dscp-cs1,omr_dscp6-cs1' '/log.getdropbox.com/omr_dscp-cs1,omr_dscp6-cs1' '/drive.google.com/omr_dscp-cs1,omr_dscp6-cs1' '/drive-thirdparty.googleusercontent.com/omr_dscp-cs1,omr_dscp6-cs1' '/docs.google.com/omr_dscp-cs1,omr_dscp6-cs1' '/docs.googleusercontent.com/omr_dscp-cs1,omr_dscp6-cs1' '/gvt1.com/omr_dscp-cs1,omr_dscp6-cs1' dhcp.lan=dhcp dhcp.lan.interface='lan' dhcp.lan.start='100' dhcp.lan.limit='150' dhcp.lan.leasetime='12h' dhcp.lan.ra_slaac='1' dhcp.lan.ra_flags='managed-config' 'other-config' dhcp.lan.force='1' dhcp.wan=dhcp dhcp.wan.interface='wan' dhcp.wan.ignore='1' dhcp.odhcpd=odhcpd dhcp.odhcpd.maindhcp='0' dhcp.odhcpd.leasefile='/tmp/hosts/odhcpd' dhcp.odhcpd.leasetrigger='/usr/sbin/odhcpd-update' dhcp.odhcpd.loglevel='4' dropbear.@dropbear[0]=dropbear dropbear.@dropbear[0].PasswordAuth='on' dropbear.@dropbear[0].RootPasswordAuth='on' dropbear.@dropbear[0].Port='22' dscp.@classify[0]=classify dscp.@classify[0].direction='both' dscp.@classify[0].proto='icmp' dscp.@classify[0].class='cs5' dscp.@classify[0].comment='ICMP' dscp.@classify[1]=classify dscp.@classify[1].direction='both' dscp.@classify[1].proto='udp' dscp.@classify[1].class='cs5' dscp.@classify[1].src_port='53,123,5353' dscp.@classify[1].comment='DNS udp and NTP' dscp.@classify[2]=classify dscp.@classify[2].direction='both' dscp.@classify[2].proto='tcp' dscp.@classify[2].class='cs5' dscp.@classify[2].src_port='53,5353' dscp.@classify[2].comment='DNS tcp' dscp.@classify[3]=classify dscp.@classify[3].direction='both' dscp.@classify[3].proto='tcp' dscp.@classify[3].class='cs6' dscp.@classify[3].dest_port='65001,65301,65011' dscp.@classify[3].comment='OMR vpn' dscp.@classify[4]=classify dscp.@classify[4].direction='both' dscp.@classify[4].proto='udp' dscp.@classify[4].class='cs6' dscp.@classify[4].dest_port='65001,65301' dscp.@classify[4].comment='OMR vpn' dscp.@domains[0]=domains dscp.@domains[0].name='googlevideo.com' dscp.@domains[0].class='cs4' dscp.@domains[0].comment='Youtube' dscp.@domains[1]=domains dscp.@domains[1].name='nflxvideo.net' dscp.@domains[1].class='cs4' dscp.@domains[1].comment='NetFlix' dscp.@domains[2]=domains dscp.@domains[2].name='s3.ll.dash.row.aiv-cdn.net' dscp.@domains[2].class='cs4' dscp.@domains[2].comment='AmazonVideo' dscp.@domains[3]=domains dscp.@domains[3].name='d25xi40x97liuc.cloudfront.net' dscp.@domains[3].class='cs4' dscp.@domains[3].comment='AmazonVideo' dscp.@domains[4]=domains dscp.@domains[4].name='aiv-delivery.net' dscp.@domains[4].class='cs4' dscp.@domains[4].comment='AmazonVideo' dscp.@domains[5]=domains dscp.@domains[5].name='fbcdn.net' dscp.@domains[5].class='cs4' dscp.@domains[5].comment='Facebook' dscp.@domains[6]=domains dscp.@domains[6].name='ttvnw.net' dscp.@domains[6].class='cs4' dscp.@domains[6].comment='Twitch' dscp.@domains[7]=domains dscp.@domains[7].name='vevo.com' dscp.@domains[7].class='cs4' dscp.@domains[7].comment='VeVo' dscp.@domains[8]=domains dscp.@domains[8].name='audio-fa.scdn.com' dscp.@domains[8].class='cs4' dscp.@domains[8].comment='Spotify' dscp.@domains[9]=domains dscp.@domains[9].name='deezer.com' dscp.@domains[9].class='cs4' dscp.@domains[9].comment='Deezer' dscp.@domains[10]=domains dscp.@domains[10].name='sndcdn.com' dscp.@domains[10].class='cs4' dscp.@domains[10].comment='SoundCloud' dscp.@domains[11]=domains dscp.@domains[11].name='last.fm' dscp.@domains[11].class='cs4' dscp.@domains[11].comment='last.fm' dscp.@domains[12]=domains dscp.@domains[12].name='v.redd.it' dscp.@domains[12].class='cs4' dscp.@domains[12].comment='reddit videos' dscp.@domains[13]=domains dscp.@domains[13].name='ttvnw.net' dscp.@domains[13].class='cs4' dscp.@domains[13].comment='twitch.tv' dscp.@domains[14]=domains dscp.@domains[14].name='googletagmanager.com' dscp.@domains[14].class='cs2' dscp.@domains[14].comment='cdn' dscp.@domains[15]=domains dscp.@domains[15].name='googleusercontent.com' dscp.@domains[15].class='cs2' dscp.@domains[15].comment='cdn' dscp.@domains[16]=domains dscp.@domains[16].name='google.com' dscp.@domains[16].class='cs2' dscp.@domains[16].comment='cdn' dscp.@domains[17]=domains dscp.@domains[17].name='fbcdn.net' dscp.@domains[17].class='cs2' dscp.@domains[17].comment='cdn' dscp.@domains[18]=domains dscp.@domains[18].name='akamaihd.net' dscp.@domains[18].class='cs2' dscp.@domains[18].comment='cdn' dscp.@domains[19]=domains dscp.@domains[19].name='whatsapp.net' dscp.@domains[19].class='cs2' dscp.@domains[19].comment='cdn' dscp.@domains[20]=domains dscp.@domains[20].name='whatsapp.com' dscp.@domains[20].class='cs2' dscp.@domains[20].comment='cdn' dscp.@domains[21]=domains dscp.@domains[21].name='googleapis.com' dscp.@domains[21].class='cs2' dscp.@domains[21].comment='cdn' dscp.@domains[22]=domains dscp.@domains[22].name='1e100.net' dscp.@domains[22].class='cs2' dscp.@domains[22].comment='cdn' dscp.@domains[23]=domains dscp.@domains[23].name='hwcdn.net' dscp.@domains[23].class='cs2' dscp.@domains[23].comment='cdn' dscp.@domains[24]=domains dscp.@domains[24].name='download.qq.com' dscp.@domains[24].class='cs1' dscp.@domains[24].comment='qq download' dscp.@domains[25]=domains dscp.@domains[25].name='steamcontent.com' dscp.@domains[25].class='cs1' dscp.@domains[25].comment='Steam download' dscp.@domains[26]=domains dscp.@domains[26].name='gs2.ww.prod.dl.playstation.net' dscp.@domains[26].class='cs1' dscp.@domains[26].comment='PSN download' dscp.@domains[27]=domains dscp.@domains[27].name='dropbox.com' dscp.@domains[27].class='cs1' dscp.@domains[27].comment='Dropbox' dscp.@domains[28]=domains dscp.@domains[28].name='dropboxstatic.com' dscp.@domains[28].class='cs1' dscp.@domains[28].comment='Dropbox' dscp.@domains[29]=domains dscp.@domains[29].name='dropbox-dns.com' dscp.@domains[29].class='cs1' dscp.@domains[29].comment='Dropbox' dscp.@domains[30]=domains dscp.@domains[30].name='log.getdropbox.com' dscp.@domains[30].class='cs1' dscp.@domains[30].comment='Dropbox' dscp.@domains[31]=domains dscp.@domains[31].name='drive.google.com' dscp.@domains[31].class='cs1' dscp.@domains[31].comment='Google Drive' dscp.@domains[32]=domains dscp.@domains[32].name='drive-thirdparty.googleusercontent.com' dscp.@domains[32].class='cs1' dscp.@domains[32].comment='Google Drive' dscp.@domains[33]=domains dscp.@domains[33].name='docs.google.com' dscp.@domains[33].class='cs1' dscp.@domains[33].comment='Google Docs' dscp.@domains[34]=domains dscp.@domains[34].name='docs.googleusercontent.com' dscp.@domains[34].class='cs1' dscp.@domains[34].comment='Google Docs' dscp.@domains[35]=domains dscp.@domains[35].name='gvt1.com' dscp.@domains[35].class='cs1' dscp.@domains[35].comment='PlayStore Download' dscp.@domains[36]=domains dscp.@domains[36].name='mmg-fna.whatsapp.net' dscp.@domains[36].class='cs1' dscp.@domains[36].comment='WhatsApp Files' dscp.@domains[37]=domains dscp.@domains[37].name='upload.youtube.com' dscp.@domains[37].class='cs1' dscp.@domains[37].comment='Youtube Upload' dscp.@domains[38]=domains dscp.@domains[38].name='upload.video.google.com' dscp.@domains[38].class='cs1' dscp.@domains[38].comment='Youtube Upload' dscp.@domains[39]=domains dscp.@domains[39].name='windowsupdate.com' dscp.@domains[39].class='cs1' dscp.@domains[39].comment='WindowsUpdate' dscp.@domains[40]=domains dscp.@domains[40].name='update.microsoft.com' dscp.@domains[40].class='cs1' dscp.@domains[40].comment='WindowsUpdate' dsvpn.vpn=dsvpn dsvpn.vpn.dev='tun0' dsvpn.vpn.localip='10.255.251.2' dsvpn.vpn.remoteip='10.255.251.1' dsvpn.vpn.mode='client' dsvpn.vpn.enable='0' dsvpn.vpn.host='27.112.X.X' dsvpn.vpn.key='5219E55C91C14926406760D77D328C78C55447561F13BEA105E768F12C948E5B' dsvpn.vpn.port='65401' etherwake.setup=etherwake etherwake.setup.pathes='/usr/bin/etherwake /usr/bin/ether-wake' etherwake.setup.sudo='off' etherwake.setup.broadcast='off' etherwake.@target[0]=target etherwake.@target[0].name='example' etherwake.@target[0].mac='11:22:33:44:55:66' etherwake.@target[0].password='AABBCCDDEEFF' etherwake.@target[0].wakeonboot='off' firewall.@defaults[0]=defaults firewall.@defaults[0].syn_flood='1' firewall.@defaults[0].forward='REJECT' firewall.@defaults[0].input='REJECT' firewall.@defaults[0].output='REJECT' firewall.@zone[0]=zone firewall.@zone[0].name='lan' firewall.@zone[0].network='lan' firewall.@zone[0].input='ACCEPT' firewall.@zone[0].output='ACCEPT' firewall.@zone[0].forward='ACCEPT' firewall.@zone[0].auto_helper='0' firewall.@zone[0].mtu_fix='1' firewall.@zone[1]=zone firewall.@zone[1].name='wan' firewall.@zone[1].input='REJECT' firewall.@zone[1].output='ACCEPT' firewall.@zone[1].forward='REJECT' firewall.@zone[1].masq='1' firewall.@zone[1].mtu_fix='1' firewall.@zone[1].network='wan' 'wan6' 'wan1' 'wan2' 'wan3' firewall.@forwarding[0]=forwarding firewall.@forwarding[0].src='lan' firewall.@forwarding[0].dest='wan' firewall.@rule[0]=rule firewall.@rule[0].name='Allow-DHCP-Renew' firewall.@rule[0].src='wan' firewall.@rule[0].proto='udp' firewall.@rule[0].dest_port='68' firewall.@rule[0].target='ACCEPT' firewall.@rule[0].family='ipv4' firewall.@rule[1]=rule firewall.@rule[1].name='Allow-Ping' firewall.@rule[1].src='wan' firewall.@rule[1].proto='icmp' firewall.@rule[1].icmp_type='echo-request' firewall.@rule[1].family='ipv4' firewall.@rule[1].target='ACCEPT' firewall.@rule[2]=rule firewall.@rule[2].name='Allow-IGMP' firewall.@rule[2].src='wan' firewall.@rule[2].proto='igmp' firewall.@rule[2].family='ipv4' firewall.@rule[2].target='ACCEPT' firewall.@rule[3]=rule firewall.@rule[3].name='Allow-DHCPv6' firewall.@rule[3].src='wan' firewall.@rule[3].proto='udp' firewall.@rule[3].src_ip='fc00::/6' firewall.@rule[3].dest_ip='fc00::/6' firewall.@rule[3].dest_port='546' firewall.@rule[3].family='ipv6' firewall.@rule[3].target='ACCEPT' firewall.@rule[4]=rule firewall.@rule[4].name='Allow-MLD' firewall.@rule[4].src='wan' firewall.@rule[4].proto='icmp' firewall.@rule[4].src_ip='fe80::/10' firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0' firewall.@rule[4].family='ipv6' firewall.@rule[4].target='ACCEPT' firewall.@rule[5]=rule firewall.@rule[5].name='Allow-ICMPv6-Forward' firewall.@rule[5].src='wan' firewall.@rule[5].dest='' firewall.@rule[5].proto='icmp' firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type' firewall.@rule[5].limit='1000/sec' firewall.@rule[5].family='ipv6' firewall.@rule[5].target='ACCEPT' firewall.@rule[6]=rule firewall.@rule[6].name='Allow-IPSec-ESP' firewall.@rule[6].src='wan' firewall.@rule[6].dest='lan' firewall.@rule[6].proto='esp' firewall.@rule[6].target='ACCEPT' firewall.@rule[7]=rule firewall.@rule[7].name='Allow-ISAKMP' firewall.@rule[7].src='wan' firewall.@rule[7].dest='lan' firewall.@rule[7].dest_port='500' firewall.@rule[7].proto='udp' firewall.@rule[7].target='ACCEPT' firewall.@rule[8]=rule firewall.@rule[8].name='Support-UDP-Traceroute' firewall.@rule[8].src='wan' firewall.@rule[8].dest_port='33434:33689' firewall.@rule[8].proto='udp' firewall.@rule[8].family='ipv4' firewall.@rule[8].target='REJECT' firewall.@rule[8].enabled='false' firewall.@include[0]=include firewall.@include[0].path='/etc/firewall.user' firewall.@rule[9]=rule firewall.@rule[9].enabled='1' firewall.@rule[9].target='ACCEPT' firewall.@rule[9].name='Allow-All-LAN-to-VPN' firewall.@rule[9].dest='vpn' firewall.@rule[9].src='lan' firewall.zone_vpn=zone firewall.zone_vpn.name='vpn' firewall.zone_vpn.masq='1' firewall.zone_vpn.input='REJECT' firewall.zone_vpn.forward='ACCEPT' firewall.zone_vpn.output='ACCEPT' firewall.zone_vpn.network='glorytun' 'omrvpn' 'omr6in4' 'ovpnwan3' firewall.zone_vpn.mtu_fix='1' firewall.@rule[10]=rule firewall.@rule[10].enabled='1' firewall.@rule[10].target='ACCEPT' firewall.@rule[10].name='Allow-All-Ping' firewall.@rule[10].proto='icmp' firewall.@rule[10].dest='' firewall.@rule[10].src='' firewall.@rule[10].icmp_type='echo-request' firewall.@rule[11]=rule firewall.@rule[11].enabled='1' firewall.@rule[11].target='ACCEPT' firewall.@rule[11].name='Allow-VPN-ICMP' firewall.@rule[11].proto='icmp' firewall.@rule[11].src='vpn' firewall.@rule[12]=rule firewall.@rule[12].enabled='1' firewall.@rule[12].target='ACCEPT' firewall.@rule[12].name='Allow-Lan-to-Wan' firewall.@rule[12].dest='wan' firewall.@rule[12].src='lan' firewall.@rule[13]=rule firewall.@rule[13].enabled='1' firewall.@rule[13].target='ACCEPT' firewall.@rule[13].name='ICMPv6-Lan-to-OMR' firewall.@rule[13].src='lan' firewall.@rule[13].family='ipv6' firewall.@rule[13].proto='icmp' firewall.@rule[13].limit='1000/sec' firewall.@rule[13].icmp_type='echo-reply destination-unreachable echo-request router-advertisement router-solicitation time-exceeded' firewall.omr_server=include firewall.omr_server.path='/etc/firewall.omr-server' firewall.omr_server.reload='1' firewall.gre_tunnel=include firewall.gre_tunnel.path='/etc/firewall.gre-tunnel' firewall.gre_tunnel.reload='1' firewall.fwlantovpn=forwarding firewall.fwlantovpn.src='lan' firewall.fwlantovpn.dest='vpn' firewall.blockquicproxy=rule firewall.blockquicproxy.name='Block QUIC Proxy' firewall.blockquicproxy.proto='udp' firewall.blockquicproxy.dest_port='443' firewall.blockquicproxy.target='DROP' firewall.blockquicproxy.src='lan' firewall.blockquicall=rule firewall.blockquicall.name='Block QUIC All' firewall.blockquicall.proto='udp' firewall.blockquicall.src='' firewall.blockquicall.dest='' firewall.blockquicall.dest_port='443' firewall.blockquicall.target='DROP' firewall.allow_dhcp_request_vpn=rule firewall.allow_dhcp_request_vpn.name='Allow-DHCP-Request-VPN' firewall.allow_dhcp_request_vpn.src='vpn' firewall.allow_dhcp_request_vpn.proto='udp' firewall.allow_dhcp_request_vpn.dest_port='67' firewall.allow_dhcp_request_vpn.target='ACCEPT' firewall.allow_dhcp_request_vpn.family='ipv4' firewall.v2ray=include firewall.v2ray.path='/etc/firewall.v2ray-rules' firewall.v2ray.reload='1' firewall.omr_bypass=include firewall.omr_bypass.path='/etc/firewall.omr-bypass' firewall.omr_bypass.reload='1' firewall.miniupnpd=include firewall.miniupnpd.type='script' firewall.miniupnpd.path='/usr/share/miniupnpd/firewall.include' firewall.miniupnpd.family='any' firewall.miniupnpd.reload='1' firewall.ss_rules=include firewall.ss_rules.path='/etc/firewall.ss-rules' firewall.ss_rules.reload='1' firewall.@redirect[0]=redirect firewall.@redirect[0].target='DNAT' firewall.@redirect[0].name='DMZ' firewall.@redirect[0].proto='all' firewall.@redirect[0].src='vpn' firewall.@redirect[0].dest='lan' firewall.@redirect[0].dest_ip='192.168.120.123' fstab.@global[0]=global fstab.@global[0].anon_swap='0' fstab.@global[0].anon_mount='0' fstab.@global[0].auto_swap='1' fstab.@global[0].auto_mount='1' fstab.@global[0].delay_root='5' fstab.@global[0].check_fs='0' fstab.@mount[0]=mount fstab.@mount[0].target='/overlay' fstab.@mount[0].uuid='550cca64-bb82-4872-99b3-3f37dc90d031' fstab.@mount[0].enabled='0' fstab.@mount[1]=mount fstab.@mount[1].target='/boot' fstab.@mount[1].uuid='84173db5-fa99-e35a-95c6-28613cc79ea9' fstab.@mount[1].enabled='0' fstab.@mount[2]=mount fstab.@mount[2].target='/rom' fstab.@mount[2].uuid='84dadda6-db96d3e5-05323332-ae4ae5ad' fstab.@mount[2].enabled='0' glorytun.vpn=glorytun glorytun.vpn.port='65001' glorytun.vpn.dev='tun0' glorytun.vpn.mptcp='1' glorytun.vpn.proto='tcp' glorytun.vpn.chacha20='1' glorytun.vpn.mtuauto='1' glorytun.vpn.localip='10.255.255.2' glorytun.vpn.remoteip='10.255.255.1' glorytun.vpn.multiqueue='1' glorytun.vpn.label='Default VPN' glorytun.vpn.enable='1' glorytun.vpn.host='27.112.X.X' glorytun.vpn.key='C67AE01F9C1739FAC502AAF80B563602359784519C1C7C5CEC89C4E020E01BFB' glorytun-udp.vpn=glorytun-udp glorytun-udp.vpn.enable='0' glorytun-udp.vpn.port='65001' glorytun-udp.vpn.dev='tun0' glorytun-udp.vpn.chacha='1' glorytun-udp.vpn.localip='10.255.254.2' glorytun-udp.vpn.remoteip='10.255.254.1' glorytun-udp.vpn.mode='to' glorytun-udp.vpn.host='27.112.X.X' glorytun-udp.vpn.key='C67AE01F9C1739FAC502AAF80B563602359784519C1C7C5CEC89C4E020E01BFB' https-dns-proxy.config=main https-dns-proxy.config.update_dnsmasq_config='' https-dns-proxy.@https-dns-proxy[0]=https-dns-proxy https-dns-proxy.@https-dns-proxy[0].bootstrap_dns='8.8.8.8,8.8.4.4' https-dns-proxy.@https-dns-proxy[0].resolver_url='https://dns.google/dns-query' https-dns-proxy.@https-dns-proxy[0].listen_addr='127.0.0.1' https-dns-proxy.@https-dns-proxy[0].listen_port='5053' https-dns-proxy.@https-dns-proxy[0].user='nobody' https-dns-proxy.@https-dns-proxy[0].group='nogroup' https-dns-proxy.@https-dns-proxy[1]=https-dns-proxy https-dns-proxy.@https-dns-proxy[1].bootstrap_dns='1.1.1.1,1.0.0.1' https-dns-proxy.@https-dns-proxy[1].resolver_url='https://cloudflare-dns.com/dns-query' https-dns-proxy.@https-dns-proxy[1].listen_addr='127.0.0.1' https-dns-proxy.@https-dns-proxy[1].listen_port='5054' https-dns-proxy.@https-dns-proxy[1].user='nobody' https-dns-proxy.@https-dns-proxy[1].group='nogroup' igmpproxy.@igmpproxy[0]=igmpproxy igmpproxy.@igmpproxy[0].quickleave='1' igmpproxy.@phyint[0]=phyint igmpproxy.@phyint[0].network='wan' igmpproxy.@phyint[0].zone='wan' igmpproxy.@phyint[0].direction='upstream' igmpproxy.@phyint[0].altnet='192.168.1.0/24' igmpproxy.@phyint[1]=phyint igmpproxy.@phyint[1].network='lan' igmpproxy.@phyint[1].zone='lan' igmpproxy.@phyint[1].direction='downstream' iperf.bouygues=server iperf.bouygues.host='bouygues.iperf.fr' iperf.bouygues.ipv4='1' iperf.bouygues.ipv6='1' iperf.bouygues.speed='10000' iperf.bouygues.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209' iperf.bouygues.tcp='1' iperf.bouygues.udp='0' iperf.bouygues.location='Europe' iperf.online_ipv4=server iperf.online_ipv4.host='ping.online.net' iperf.online_ipv4.ipv4='1' iperf.online_ipv4.ipv6='0' iperf.online_ipv4.speed='10000' iperf.online_ipv4.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209' iperf.online_ipv4.tcp='1' iperf.online_ipv4.udp='1' iperf.online_ipv4.location='Europe' iperf.online_ipv6=server iperf.online_ipv6.host='ping.online.net' iperf.online_ipv6.ipv4='0' iperf.online_ipv6.ipv6='1' iperf.online_ipv6.speed='10000' iperf.online_ipv6.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209' iperf.online_ipv6.tcp='1' iperf.online_ipv6.udp='1' iperf.online_ipv6.location='Europe' iperf.serverius=server iperf.serverius.host='speedtest.serverius.net' iperf.serverius.ipv4='1' iperf.serverius.ipv6='1' iperf.serverius.speed='10000' iperf.serverius.ports='5002' iperf.serverius.tcp='1' iperf.serverius.udp='1' iperf.serverius.location='Europe' iperf.eenet=server iperf.eenet.host='iperf.eenet.ee' iperf.eenet.ipv4='1' iperf.eenet.ipv6='0' iperf.eenet.ports='5201' iperf.eenet.tcp='1' iperf.eenet.udp='1' iperf.eenet.location='Europe' iperf.volia=server iperf.volia.host='iperf.volia.net' iperf.volia.ipv4='1' iperf.volia.ipv6='0' iperf.volia.ports='5201' iperf.volia.tcp='1' iperf.volia.udp='1' iperf.volia.location='Europe' iperf.it_north=server iperf.it_north.host='iperf.it-north.net' iperf.it_north.ipv4='1' iperf.it_north.ipv6='0' iperf.it_north.speed='1000' iperf.it_north.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209' iperf.it_north.tcp='1' iperf.it_north.udp='1' iperf.it_north.location='Asia' iperf.biznet=server iperf.biznet.host='iperf.biznetnetworkds.com' iperf.biznet.ipv4='1' iperf.biznet.ipv6='1' iperf.biznet.speed='1000' iperf.biznet.ports='5201,5202,5203' iperf.biznet.tcp='1' iperf.biznet.udp='0' iperf.biznet.location='Asia' iperf.scottlinux=server iperf.scottlinux.host='iperf.scottlinux.com' iperf.scottlinux.ipv4='1' iperf.scottlinux.ipv6='1' iperf.scottlinux.speed='1000' iperf.scottlinux.ports='5201' iperf.scottlinux.tcp='1' iperf.scottlinux.udp='1' iperf.scottlinux.location='America' iperf.he=server iperf.he.host='iperf.he.net' iperf.he.ipv4='1' iperf.he.ipv6='1' iperf.he.ports='5201' iperf.he.tcp='1' iperf.he.udp='1' iperf.he.location='America' iperf.vps=server iperf.vps.host='27.112.X.X' iperf.vps.ports='65400' iperf.vps.ipv4='1' iperf.vps.ipv6='0' iperf.vps.speed='1000' iperf.vps.tcp='1' iperf.vps.udp='1' iperf.vps.user='openmptcprouter' iperf.vps.password='openmptcprouter' iperf.vps.key='LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUEwQnFtQkprdTRTODhGMUs1Y2hmZgpkTUhKTUpmdkFQVU54eitFNGl2cFFUYk1iSUJzSmJIU0dTZEtGcS82cG1yRTNYVUN3d1BFR2JTWGlVeTU4emVJCngzTm9vVGxKV05HQ2x1dTVMc3Ftak9UY0JmQmtqcG5MU1pIaVIxSG8vb01iYVpuUER2WU1heVp5ZVpGOE0vVzAKd0tITHFMNVF5VnAvSmFDck5vbDNFMFcySkZmV0cvNjZZN3lRZDlXTW94QjdSYmZCbjhZeHV2bEhaeE5LajNyRwpKclNjNU1Yajl0dk1MQnlyRysxMHNUejZuWGIzUmFmNm1GZXJpUHhnNUxUdWFvVmwrMmZpZ1ZPVjYzQlREMDJQClJBbkpwZEIwWlJwbWJsMUxnQUhGaTBuakh3MTZKOEU2a3I2cDRKKzNBdllScVY4YVR5ZDZTRTdkUDhRcWlYWkQKc1FJREFRQUIKLS0tLS1FTkQgUFVCTElDIEtFWS0tLS0tCg==' luci.main=core luci.main.lang='auto' luci.main.resourcebase='/luci-static/resources' luci.main.ubuspath='/ubus/' luci.main.mediaurlbase='/luci-static/openmptcprouter' luci.flash_keep=extern luci.flash_keep.uci='/etc/config/' luci.flash_keep.dropbear='/etc/dropbear/' luci.flash_keep.openvpn='/etc/openvpn/' luci.flash_keep.passwd='/etc/passwd' luci.flash_keep.opkg='/etc/opkg.conf' luci.flash_keep.firewall='/etc/firewall.user' luci.flash_keep.uploads='/lib/uci/upload/' luci.languages=internal luci.languages.ar='العربية (Arabic)' luci.languages.bg='български (Bulgarian)' luci.languages.bn='বাংলা (Bengali)' luci.languages.ca='Català (Catalan)' luci.languages.cs='Čeština (Czech)' luci.languages.de='Deutsch (German)' luci.languages.el='Ελληνικά (Greek)' luci.languages.en='English' luci.languages.es='Español (Spanish)' luci.languages.fi='Suomi (Finnish)' luci.languages.fr='Français (French)' luci.languages.he='עִבְרִית (Hebrew)' luci.languages.hi='हिंदी (Hindi)' luci.languages.hu='Magyar (Hungarian)' luci.languages.it='Italiano (Italian)' luci.languages.ja='日本語 (Japanese)' luci.languages.ko='한국어 (Korean)' luci.languages.mr='Marāṭhī (Marathi)' luci.languages.ms='Bahasa Melayu (Malay)' luci.languages.no='Norsk (Norwegian)' luci.languages.pl='Polski (Polish)' luci.languages.pt='Português (Portuguese)' luci.languages.pt_br='Português do Brasil (Brazilian Portuguese)' luci.languages.ro='Română (Romanian)' luci.languages.ru='Русский (Russian)' luci.languages.sk='Slovenčina (Slovak)' luci.languages.sv='Svenska (Swedish)' luci.languages.tr='Türkçe (Turkish)' luci.languages.uk='Українська (Ukrainian)' luci.languages.vi='Tiếng Việt (Vietnamese)' luci.languages.zh_cn='简体中文 (Chinese Simplified)' luci.languages.zh_tw='繁體中文 (Chinese Traditional)' luci.sauth=internal luci.sauth.sessionpath='/tmp/luci-sessions' luci.sauth.sessiontime='3600' luci.ccache=internal luci.ccache.enable='1' luci.themes=internal luci.themes.Argon='/luci-static/argon' luci.themes.OpenMPTCProuter='/luci-static/openmptcprouter' luci.apply=internal luci.apply.rollback='90' luci.apply.holdoff='4' luci.apply.display='1.5' luci.apply.timeout='20' luci.diag=internal luci.diag.ping='openmptcprouter.com' luci.diag.dns='openmptcprouter.com' luci.diag.route='openmptcprouter.com' luci.diag.iperf3='ping-ams1.online.net' luci.diag.getip='ip.openmptcprouter.com' macvlan.wan1=macvlan macvlan.wan1.name='wan1' macvlan.wan1.ifname='eth0' macvlan.wan2=macvlan macvlan.wan2.name='wan2' macvlan.wan2.ifname='eth0' mail.default=smtp mlvpn.general=mlvpn mlvpn.general.enable='0' mlvpn.general.timeout='30' mlvpn.general.reorder_buffer_size='128' mlvpn.general.loss_tolerence='50' mlvpn.general.mode='client' mlvpn.general.firstport='65201' mlvpn.general.interface_name='mlvpn0' mlvpn.general.host='27.112.X.X' mlvpn.general.password='lpjx8dQvpzDYXS3CVdx1fnJWgDmKA0QyIcQDGvf3Wf4=' network.loopback=interface network.loopback.ifname='lo' network.loopback.proto='static' network.loopback.ipaddr='127.0.0.1' network.loopback.netmask='255.0.0.0' network.loopback.multipath='off' network.loopback.macaddr='00:00:00:00:00:00' network.loopback.metric='5' network.globals=globals network.globals.ula_prefix='fdd9:b818:2f3e::/48' network.globals.multipath='enable' network.globals.mptcp_path_manager='fullmesh' network.globals.mptcp_scheduler='blest' network.globals.congestion='cubic' network.globals.mptcp_checksum='0' network.globals.mptcp_debug='0' network.globals.mptcp_syn_retries='2' network.globals.mptcp_fullmesh_num_subflows='1' network.globals.mptcp_fullmesh_create_on_err='1' network.globals.mptcp_ndiffports_num_subflows='1' network.lan=interface network.lan.ifname='eth0' network.lan.proto='static' network.lan.netmask='255.255.255.0' network.lan.ip6assign='60' network.lan.ipv6='0' network.lan.delegate='0' network.lan.multipath='off' network.lan.ip4table='lan' network.lan.macaddr='00:15:5d:02:a2:00' network.lan.metric='6' network.lan.addlatency='0' network.lan.ipaddr='192.168.120.1' network.lan.defaultroute='0' network.lan.peerdns='0' network.wan1=interface network.wan1.ifname='eth1' network.wan1.ip4table='wan' network.wan1.multipath='master' network.wan1.defaultroute='0' network.wan1.macaddr='00:15:5d:02:a2:01' network.wan1.peerdns='0' network.wan1.ipv6='0' network.wan1.metric='7' network.wan1.label='WAN1' network.wan1.proto='dhcp' network.wan2=interface network.wan2.ifname='eth2' network.wan2.ip4table='wan' network.wan2.defaultroute='0' network.wan2.macaddr='00:15:5d:02:a2:02' network.wan2.ipv6='0' network.wan2.metric='8' network.wan2.peerdns='0' network.wan2.label='WAN2' network.wan2.proto='dhcp' network.wan2.multipath='on' network.wan3=interface network.wan3.ifname='eth3' network.wan3.ip4table='wan' network.wan3.defaultroute='0' network.wan3.macaddr='00:15:5d:02:a2:03' network.wan3.metric='9' network.wan3.peerdns='0' network.wan3.ipv6='0' network.wan3.label='WAN3' network.wan3.proto='dhcp' network.wan3.multipath='off' network.lan_rule=rule network.lan_rule.lookup='lan' network.lan_rule.priority='100' network.omrvpn=interface network.omrvpn.ifname='tun0' network.omrvpn.ip4table='vpn' network.omrvpn.multipath='off' network.omrvpn.leasetime='12h' network.omrvpn.type='tunnel' network.omrvpn.txqueuelen='100' network.omrvpn.metric='1200' network.omrvpn.ipv6='0' network.omrvpn.proto='none' network.omr6in4=interface network.omr6in4.proto='6in4' network.omr6in4.ip4table='vpn' network.omr6in4.multipath='off' network.omr6in4.ipaddr='10.255.255.2' network.omr6in4.peeraddr='10.255.255.1' network.omr6in4.gateway='fe80::a00:1' network.omr6in4.ip6addr='fe80::a00:2/128' network.omr6in4.auto='0' network.omr6in4.metric='1201' network.ovpnwan3=interface network.ovpnwan3.ifname='tun9' network.ovpnwan3.defaultroute='0' network.ovpnwan3.peerdns='0' network.ovpnwan3.proto='none' network.ovpnwan3.ip4table='wan' network.ovpnwan3.multipath='on' network.ovpnwan3.metric='10' network.ovpnwan3.ipv6='0' omr-bypass.all=interface omr-bypass.m6replay=proto omr-bypass.m6replay.url='m6web.fr' '6play.fr' '6cloud.fr' omr-bypass.mycanal=proto omr-bypass.mycanal.url='mycanal.fr' 'canal-plus.com' 'canalplus.com' 'canalplus-cdn.net' 'canalplus.pro' 'canal-plus.net' omr-bypass.minecraft=proto omr-bypass.minecraft.url='authserver.mojang.com' omr-bypass.lesnumeriques=proto omr-bypass.lesnumeriques.url='lesnumeriques.com' 'botscorner.com' 'app.botscorner.com' omr-bypass.disneyplus=proto omr-bypass.disneyplus.url='bamgrid.com' 'disney-plus.net' omr-bypass.lo=interface omr-bypass.lo.id='5' omr-bypass.eth0=interface omr-bypass.eth0.id='6' omr-bypass.wan1=interface omr-bypass.wan1.id='3' omr-bypass.wan2=interface omr-bypass.wan2.id='4' omr-bypass.tun0=interface omr-bypass.tun0.id='1200' omr-bypass.eth3=interface omr-bypass.eth3.id='9' omr-bypass.eth1=interface omr-bypass.eth1.id='7' omr-bypass.eth2=interface omr-bypass.eth2.id='8' omr-bypass.tun8=interface omr-bypass.tun8.id='10' omr-bypass.tun9=interface omr-bypass.tun9.id='10' omr-quota.wan1=interface omr-quota.wan1.enabled='0' omr-quota.wan1.txquota='100000' omr-quota.wan1.rxquota='400000' omr-quota.wan1.ttquota='500000' omr-quota.wan1.interval='10' omr-quota.wan1.interface='wan1' omr-quota.wan2=interface omr-quota.wan2.enabled='0' omr-quota.wan2.txquota='100000' omr-quota.wan2.rxquota='400000' omr-quota.wan2.ttquota='500000' omr-quota.wan2.interval='10' omr-quota.wan2.interface='wan2' omr-tracker.defaults=defaults omr-tracker.defaults.enabled='1' omr-tracker.defaults.hosts='4.2.2.1' '8.8.8.8' '80.67.169.12' '8.8.4.4' '9.9.9.9' '1.0.0.1' '114.114.115.115' '1.2.4.8' '80.67.169.40' '114.114.114.114' '1.1.1.1' omr-tracker.defaults.timeout='2' omr-tracker.defaults.tries='3' omr-tracker.defaults.interval='2' omr-tracker.defaults.interval_tries='1' omr-tracker.defaults.type='ping' omr-tracker.defaults.wait_test='0' omr-tracker.proxy=proxy omr-tracker.proxy.enabled='1' omr-tracker.proxy.hosts='1.0.0.1' '212.27.48.10' '198.27.92.1' '151.101.129.164' '77.88.55.77' '1.1.1.1' '74.82.42.42' '176.103.130.130' omr-tracker.proxy.timeout='10' omr-tracker.proxy.tries='3' omr-tracker.proxy.wait_test='0' omr-tracker.proxy.interval_tries='1' omr-tracker.proxy.interval='5' omr-tracker.server=server omr-tracker.server.enabled='1' omr-tracker.server.tries='3' omr-tracker.server.timeout='10' omr-tracker.server.wait_test='0' omr-tracker.server.interval='5' omr-tracker.omrvpn=interface omr-tracker.omrvpn.type='none' omr-tracker.omrvpn.timeout='6' omr-tracker.omrvpn.tries='2' omr-tracker.omrvpn.interval='4' omr-tracker.omrvpn.mail_alert='0' omr-tracker.omrvpn.enabled='1' openmptcprouter.settings=settings openmptcprouter.settings.enabled='1' openmptcprouter.settings.version='0.57.3' openmptcprouter.settings.master='balancing' openmptcprouter.settings.disable_ipv6='1' openmptcprouter.settings.check_ipv4_website='http://ip.openmptcprouter.com' openmptcprouter.settings.check_ipv6_website='http://ipv6.openmptcprouter.com' openmptcprouter.settings.status_vps_timeout='2' openmptcprouter.settings.status_getip_timeout='2' openmptcprouter.settings.enable_nodelay='1' openmptcprouter.settings.scaling_governor='performance' openmptcprouter.settings.menu='OpenMPTCProuter' openmptcprouter.settings.serial='9968-3165-5256-3618-9642-8372-84' openmptcprouter.settings.proxy='shadowsocks' openmptcprouter.settings.ha='0' openmptcprouter.settings.vpn='glorytun_tcp' openmptcprouter.settings.firstboot='0' openmptcprouter.settings.disable_fastopen='0' openmptcprouter.settings.external_check='1' openmptcprouter.settings.debug='0' openmptcprouter.settings.disablegwping='0' openmptcprouter.settings.disableintfrename='0' openmptcprouter.settings.defaultgw='1' openmptcprouter.settings.tracebox='1' openmptcprouter.settings.disableserverping='0' openmptcprouter.settings.shadowsocksudp='0' openmptcprouter.settings.vnstat_backup='0' openmptcprouter.settings.apilc='1619676899' openmptcprouter.vps=server openmptcprouter.vps.username='openmptcprouter' openmptcprouter.vps.master='1' openmptcprouter.vps.backup='0' openmptcprouter.vps.port='65500' openmptcprouter.vps.pihole='0' openmptcprouter.vps.kernel='5.4.86-mptcp' openmptcprouter.vps.machine='x86_64' openmptcprouter.vps.omr_version='0.1024' openmptcprouter.vps.nofwredirect='1' openmptcprouter.vps.password='5EC5EB1A4CCAD88910BD15656659AEC07032CB3621C48D1994F3DFA6DBC8C67A' openmptcprouter.vps.ip='27.112.X.X' openmptcprouter.vps.redirect_ports='0' openmptcprouter.vps.available_vpn='glorytun_tcp' 'glorytun_udp' 'dsvpn' 'openvpn' 'openvpn_bonding' 'mlvpn' openmptcprouter.vps.get_config='0' openmptcprouter.vps.admin_error='0' openmptcprouter.vps.token='eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJvcGVubXB0Y3Byb3V0ZXIiLCJleHAiOjE2MTY0MTY0NTN9.fajuHdHSjI86kjLC9AJYRVDiSwsar9SJgwpeJ7aTh00' openmptcprouter.vps.lastchange='1616330055' openmptcprouter.omr=router openmptcprouter.omr.shadowsocks='up' openmptcprouter.omr.detected_public_ipv4='27.112.X.X' openmptcprouter.omr.detected_ss_ipv4='27.112.X.X' openmptcprouter.omrvpn=interface openmptcprouter.omrvpn.multipath='off' openmptcprouter.omrvpn.metric='1200' openmptcprouter.loopback=interface openmptcprouter.loopback.multipath='off' openmptcprouter.loopback.metric='5' openmptcprouter.lan=interface openmptcprouter.lan.multipath='off' openmptcprouter.lan.metric='6' openmptcprouter.lan.multipathvpn='0' openmptcprouter.omr6in4=interface openmptcprouter.omr6in4.multipath='off' openmptcprouter.omr6in4.metric='1201' openmptcprouter.latest_versions=latest_versions openmptcprouter.latest_versions.omr='0.57.3' openmptcprouter.latest_versions.vps='0.1024' openmptcprouter.latest_versions.lc='1616326505' openmptcprouter.wan2=interface openmptcprouter.wan2.metric='8' openmptcprouter.wan2.mptcp_status='MPTCP enabled' openmptcprouter.wan2.multipath='on' openmptcprouter.wan2.multipathvpn='0' openmptcprouter.wan2.state='up' openmptcprouter.wan2.publicip='125.161.131.1' openmptcprouter.wan2.asn='TLKM_D2_BB_SPEEDY_KBB' openmptcprouter.wan2.manufacturer='huawei' openmptcprouter.wan2.lc='1616329893' openmptcprouter.wan2.latency_previous='7' openmptcprouter.wan2.latency='238' openmptcprouter.wan1=interface openmptcprouter.wan1.multipath='master' openmptcprouter.wan1.multipathvpn='0' openmptcprouter.wan1.metric='7' openmptcprouter.wan1.mptcp_status='MPTCP enabled' openmptcprouter.wan1.asn='BM-ID' openmptcprouter.wan1.publicip='118.137.182.120' openmptcprouter.wan1.manufacturer='huawei' openmptcprouter.wan1.state='up' openmptcprouter.wan1.lc='1616329869' openmptcprouter.wan1.latency_previous='17' openmptcprouter.wan1.latency='22' openmptcprouter.wan3=interface openmptcprouter.wan3.metric='9' openmptcprouter.wan3.mptcp_status='MPTCP enabled' openmptcprouter.wan3.asn='TELKOMSEL-ID' openmptcprouter.wan3.manufacturer='huawei' openmptcprouter.wan3.state='up' openmptcprouter.wan3.publicip='114.124.200.156' openmptcprouter.wan3.multipathvpn='1' openmptcprouter.wan3.lc='1616329858' openmptcprouter.wan3.multipath='off' openmptcprouter.wan3.latency_previous='49' openmptcprouter.wan3.latency='35' openmptcprouter.ovpnwan3=interface openmptcprouter.ovpnwan3.multipath='on' openmptcprouter.ovpnwan3.vpn='1' openmptcprouter.ovpnwan3.baseintf='wan3' openmptcprouter.ovpnwan3.metric='10' openmptcprouter.ovpnwan3.state='up' openmptcprouter.ovpnwan3.lc='1616330419' openmptcprouter.ovpnwan3.latency_previous='223' openmptcprouter.ovpnwan3.latency='70' openvpn.custom_config=openvpn openvpn.custom_config.enabled='0' openvpn.custom_config.config='/etc/openvpn/my-vpn.conf' openvpn.sample_server=openvpn openvpn.sample_server.enabled='0' openvpn.sample_server.port='1194' openvpn.sample_server.proto='udp' openvpn.sample_server.dev='tun' openvpn.sample_server.ca='/etc/openvpn/ca.crt' openvpn.sample_server.cert='/etc/openvpn/server.crt' openvpn.sample_server.key='/etc/openvpn/server.key' openvpn.sample_server.dh='/etc/openvpn/dh2048.pem' openvpn.sample_server.server='10.8.0.0 255.255.255.0' openvpn.sample_server.ifconfig_pool_persist='/tmp/ipp.txt' openvpn.sample_server.keepalive='10 120' openvpn.sample_server.persist_key='1' openvpn.sample_server.persist_tun='1' openvpn.sample_server.user='nobody' openvpn.sample_server.status='/tmp/openvpn-status.log' openvpn.sample_server.verb='3' openvpn.sample_client=openvpn openvpn.sample_client.enabled='0' openvpn.sample_client.client='1' openvpn.sample_client.dev='tun' openvpn.sample_client.proto='udp' openvpn.sample_client.remote='my_server_1 1194' openvpn.sample_client.resolv_retry='infinite' openvpn.sample_client.nobind='1' openvpn.sample_client.persist_key='1' openvpn.sample_client.persist_tun='1' openvpn.sample_client.user='nobody' openvpn.sample_client.ca='/etc/openvpn/ca.crt' openvpn.sample_client.cert='/etc/openvpn/client.crt' openvpn.sample_client.key='/etc/openvpn/client.key' openvpn.sample_client.verb='3' openvpn.omr=openvpn openvpn.omr.dev='tun0' openvpn.omr.port='65301' openvpn.omr.cipher='AES-256-CBC' openvpn.omr.proto='tcp-client' openvpn.omr.enabled='0' openvpn.omr.ncp_disable='1' openvpn.omr.auth_nocache='1' openvpn.omr.client='1' openvpn.omr.tls_client='1' openvpn.omr.reneg_sec='0' openvpn.omr.allow_recursive_routing='1' openvpn.omr.sndbuf='0' openvpn.omr.rcvbuf='0' openvpn.omr.route_delay='5' openvpn.omr.key='/etc/luci-uploads/client.key' openvpn.omr.cert='/etc/luci-uploads/client.crt' openvpn.omr.ca='/etc/luci-uploads/ca.crt' openvpn.omr.remote='27.112.X.X' openvpn.wan3=openvpn openvpn.wan3.dev='tun9' openvpn.wan3.cipher='AES-256-CBC' openvpn.wan3.port='65301' openvpn.wan3.remote='27.112.X.X' openvpn.wan3.local='192.168.18.120' openvpn.wan3.lport='0' openvpn.wan3.ncp_disable='1' openvpn.wan3.auth_nocache='1' openvpn.wan3.proto='udp' openvpn.wan3.client='1' openvpn.wan3.enabled='1' openvpn.wan3.allow_recursive_routing='1' openvpn.wan3.key='/etc/luci-uploads/client.key' openvpn.wan3.cert='/etc/luci-uploads/client.crt' openvpn.wan3.ca='/etc/luci-uploads/ca.crt' openvpn_recipes.server_tun_ptp=openvpn_recipe openvpn_recipes.server_tun_ptp._description='Simple server configuration for a routed point-to-point VPN' openvpn_recipes.server_tun_ptp._role='server' openvpn_recipes.server_tun_ptp.dev='tun' openvpn_recipes.server_tun_ptp.ifconfig='10.0.0.1 10.0.0.2' openvpn_recipes.server_tun_ptp.secret='shared-secret.key' openvpn_recipes.server_tun_ptp.keepalive='10 60' openvpn_recipes.server_tun_ptp.comp_lzo='yes' openvpn_recipes.server_tun_ptp.verb='3' openvpn_recipes.server_tun_ptp.mssfix='1420' openvpn_recipes.client_tun_ptp=openvpn_recipe openvpn_recipes.client_tun_ptp._description='Simple client configuration for a routed point-to-point VPN' openvpn_recipes.client_tun_ptp._role='client' openvpn_recipes.client_tun_ptp.dev='tun' openvpn_recipes.client_tun_ptp.remote='vpnserver.example.org' openvpn_recipes.client_tun_ptp.ifconfig='10.0.0.2 10.0.0.1' openvpn_recipes.client_tun_ptp.secret='shared-secret.key' openvpn_recipes.client_tun_ptp.nobind='1' openvpn_recipes.client_tun_ptp.comp_lzo='yes' openvpn_recipes.client_tun_ptp.verb='3' openvpn_recipes.server_tun=openvpn_recipe openvpn_recipes.server_tun._description='Server configuration for a routed multi-client VPN' openvpn_recipes.server_tun._role='server' openvpn_recipes.server_tun.dev='tun' openvpn_recipes.server_tun.server='10.0.100.0 255.255.255.0' openvpn_recipes.server_tun.ca='ca.crt' openvpn_recipes.server_tun.cert='server.crt' openvpn_recipes.server_tun.key='server.key' openvpn_recipes.server_tun.dh='dh1024.pem' openvpn_recipes.server_tun.keepalive='10 60' openvpn_recipes.server_tun.comp_lzo='yes' openvpn_recipes.server_tun.verb='3' openvpn_recipes.server_tun.mssfix='1420' openvpn_recipes.client_tun=openvpn_recipe openvpn_recipes.client_tun._description='Client configuration for a routed multi-client VPN' openvpn_recipes.client_tun._role='client' openvpn_recipes.client_tun.client='1' openvpn_recipes.client_tun.dev='tun' openvpn_recipes.client_tun.remote='vpnserver.example.org' openvpn_recipes.client_tun.pkcs12='my_client.p12' openvpn_recipes.client_tun.remote_cert_tls='server' openvpn_recipes.client_tun.comp_lzo='yes' openvpn_recipes.client_tun.nobind='1' openvpn_recipes.client_tun.persist_key='1' openvpn_recipes.client_tun.persist_tun='1' openvpn_recipes.client_tun.verb='3' openvpn_recipes.client_tun.reneg_sec='0' openvpn_recipes.client_tun.float='1' openvpn_recipes.server_tap_bridge=openvpn_recipe openvpn_recipes.server_tap_bridge._description='Server configuration for an ethernet bridge VPN' openvpn_recipes.server_tap_bridge._role='server' openvpn_recipes.server_tap_bridge.dev='tap' openvpn_recipes.server_tap_bridge.server_bridge='192.168.1.1 255.255.255.0 192.168.1.128 192.168.1.254' openvpn_recipes.server_tap_bridge.ca='ca.crt' openvpn_recipes.server_tap_bridge.cert='server.crt' openvpn_recipes.server_tap_bridge.key='server.key' openvpn_recipes.server_tap_bridge.dh='dh1024.pem' openvpn_recipes.server_tap_bridge.keepalive='10 60' openvpn_recipes.server_tap_bridge.comp_lzo='yes' openvpn_recipes.server_tap_bridge.verb='3' openvpn_recipes.server_tap_bridge.mssfix='1420' openvpn_recipes.client_tap_bridge=openvpn_recipe openvpn_recipes.client_tap_bridge._description='Client configuration for an ethernet bridge VPN' openvpn_recipes.client_tap_bridge._role='client' openvpn_recipes.client_tap_bridge.client='1' openvpn_recipes.client_tap_bridge.dev='tap' openvpn_recipes.client_tap_bridge.remote='vpnserver.example.org' openvpn_recipes.client_tap_bridge.ca='ca.crt' openvpn_recipes.client_tap_bridge.cert='my_client.crt' openvpn_recipes.client_tap_bridge.key='my_client.key' openvpn_recipes.client_tap_bridge.dh='dh1024.pem' openvpn_recipes.client_tap_bridge.remote_cert_tls='server' openvpn_recipes.client_tap_bridge.comp_lzo='yes' openvpn_recipes.client_tap_bridge.nobind='1' openvpn_recipes.client_tap_bridge.persist_key='1' openvpn_recipes.client_tap_bridge.verb='3' openvpn_recipes.client_tap_bridge.reneg_sec='0' openvpn_recipes.client_tap_bridge.float='1' packet_capture.@tcpdump[0]=tcpdump rpcd.@rpcd[0]=rpcd rpcd.@rpcd[0].socket='/var/run/ubus/ubus.sock' rpcd.@rpcd[0].timeout='120' rpcd.@login[0]=login rpcd.@login[0].username='root' rpcd.@login[0].password='$p$root' rpcd.@login[0].read='' rpcd.@login[0].write='' shadowsocks-libev.hi=ss_redir shadowsocks-libev.hi.server='sss0' shadowsocks-libev.hi.local_address='::' shadowsocks-libev.hi.local_port='1100' shadowsocks-libev.hi.mode='tcp_and_udp' shadowsocks-libev.hi.timeout='1000' shadowsocks-libev.hi.fast_open='1' shadowsocks-libev.hi.verbose='0' shadowsocks-libev.hi.syslog='1' shadowsocks-libev.hi.reuse_port='1' shadowsocks-libev.hi.mptcp='1' shadowsocks-libev.hi.ipv6_first='1' shadowsocks-libev.hi.no_delay='1' shadowsocks-libev.hi.ebpf='0' shadowsocks-libev.hi2=ss_redir shadowsocks-libev.hi2.server='sss0' shadowsocks-libev.hi2.local_address='0.0.0.0' shadowsocks-libev.hi2.local_port='1100' shadowsocks-libev.hi2.mode='tcp_and_udp' shadowsocks-libev.hi2.timeout='1000' shadowsocks-libev.hi2.fast_open='1' shadowsocks-libev.hi2.verbose='0' shadowsocks-libev.hi2.syslog='1' shadowsocks-libev.hi2.reuse_port='1' shadowsocks-libev.hi2.mptcp='1' shadowsocks-libev.hi2.ipv6_first='1' shadowsocks-libev.hi2.no_delay='1' shadowsocks-libev.hi2.ebpf='0' shadowsocks-libev.ss_rules=ss_rules shadowsocks-libev.ss_rules.disabled='0' shadowsocks-libev.ss_rules.redir_tcp='hi' shadowsocks-libev.ss_rules.src_default='forward' shadowsocks-libev.ss_rules.dst_default='forward' shadowsocks-libev.ss_rules.local_default='forward' shadowsocks-libev.ss_rules.server='sss0' shadowsocks-libev.sss0=server shadowsocks-libev.sss0.server_port='65101' shadowsocks-libev.sss0.method='chacha20-ietf-poly1305' shadowsocks-libev.sss0.obfs='0' shadowsocks-libev.sss0.disabled='0' shadowsocks-libev.sss0.server='27.112.X.X' shadowsocks-libev.sss0.key='p+CKhR9S3je8sXVu6saAM3qVG1UA9IUT29oQJ1HdM3Y=' shadowsocks-libev.sss0.obfs_host='27.112.X.X' shadowsocks-libev.dns=ss_tunnel shadowsocks-libev.dns.disabled='1' shadowsocks-libev.dns.mode='tcp_and_udp' shadowsocks-libev.dns.server='sss0' shadowsocks-libev.dns.local_port='5353' shadowsocks-libev.dns.tunnel_address='8.8.8.8:53' shadowsocks-libev.tracker=ss_local shadowsocks-libev.tracker.server='sss0' shadowsocks-libev.tracker.local_address='127.0.0.1' shadowsocks-libev.tracker.local_port='1111' shadowsocks-libev.tracker.mode='tcp_and_udp' shadowsocks-libev.tracker.timeout='600' shadowsocks-libev.tracker.fast_open='1' shadowsocks-libev.tracker.syslog='0' shadowsocks-libev.tracker.reuse_port='1' shadowsocks-libev.tracker.mptcp='1' shadowsocks-libev.tracker.verbose='0' shadowsocks-libev.tracker.no_delay='1' shadowsocks-libev.tracker.ebpf='0' shadowsocks-libev.mptcpovervpn=server shadowsocks-libev.mptcpovervpn.server_port='65101' shadowsocks-libev.mptcpovervpn.key='p+CKhR9S3je8sXVu6saAM3qVG1UA9IUT29oQJ1HdM3Y=' shadowsocks-libev.mptcpovervpn.method='chacha20-ietf-poly1305' shadowsocks-libev.mptcpovervpn.server='10.255.250.1' shadowsocks-libev.hivpn1=ss_redir shadowsocks-libev.hivpn1.server='mptcpovervpn' shadowsocks-libev.hivpn1.local_address='0.0.0.0' shadowsocks-libev.hivpn1.local_port='1101' shadowsocks-libev.hivpn1.mode='tcp_and_udp' shadowsocks-libev.hivpn1.timeout='1000' shadowsocks-libev.hivpn1.fast_open='1' shadowsocks-libev.hivpn1.verbose='0' shadowsocks-libev.hivpn1.syslog='1' shadowsocks-libev.hivpn1.reuse_port='1' shadowsocks-libev.hivpn1.mptcp='1' shadowsocks-libev.hivpn1.ipv6_first='1' shadowsocks-libev.hivpn1.no_delay='1' shadowsocks-libev.hivpn2=ss_redir shadowsocks-libev.hivpn2.server='mptcpovervpn' shadowsocks-libev.hivpn2.local_address='0.0.0.0' shadowsocks-libev.hivpn2.local_port='1101' shadowsocks-libev.hivpn2.mode='tcp_and_udp' shadowsocks-libev.hivpn2.timeout='1000' shadowsocks-libev.hivpn2.fast_open='1' shadowsocks-libev.hivpn2.verbose='0' shadowsocks-libev.hivpn2.syslog='1' shadowsocks-libev.hivpn2.reuse_port='1' shadowsocks-libev.hivpn2.mptcp='1' shadowsocks-libev.hivpn2.ipv6_first='1' shadowsocks-libev.hivpn2.no_delay='1' shadowsocks-libev.hivpn3=ss_redir shadowsocks-libev.hivpn3.server='mptcpovervpn' shadowsocks-libev.hivpn3.local_address='0.0.0.0' shadowsocks-libev.hivpn3.local_port='1101' shadowsocks-libev.hivpn3.mode='tcp_and_udp' shadowsocks-libev.hivpn3.timeout='1000' shadowsocks-libev.hivpn3.fast_open='1' shadowsocks-libev.hivpn3.verbose='0' shadowsocks-libev.hivpn3.syslog='1' shadowsocks-libev.hivpn3.reuse_port='1' shadowsocks-libev.hivpn3.mptcp='1' shadowsocks-libev.hivpn3.ipv6_first='1' shadowsocks-libev.hivpn3.no_delay='1' shadowsocks-libev.hivpn4=ss_redir shadowsocks-libev.hivpn4.server='mptcpovervpn' shadowsocks-libev.hivpn4.local_address='0.0.0.0' shadowsocks-libev.hivpn4.local_port='1101' shadowsocks-libev.hivpn4.mode='tcp_and_udp' shadowsocks-libev.hivpn4.timeout='1000' shadowsocks-libev.hivpn4.fast_open='1' shadowsocks-libev.hivpn4.verbose='0' shadowsocks-libev.hivpn4.syslog='1' shadowsocks-libev.hivpn4.reuse_port='1' shadowsocks-libev.hivpn4.mptcp='1' shadowsocks-libev.hivpn4.ipv6_first='1' shadowsocks-libev.hivpn4.no_delay='1' snmpd.@agent[0]=agent snmpd.@agent[0].agentaddress='UDP:161,UDP6:161' snmpd.@agentx[0]=agentx snmpd.@agentx[0].agentxsocket='/var/run/agentx.sock' snmpd.public=com2sec snmpd.public.secname='ro' snmpd.public.source='default' snmpd.public.community='public' snmpd.private=com2sec snmpd.private.secname='rw' snmpd.private.source='localhost' snmpd.private.community='private' snmpd.public_v1=group snmpd.public_v1.group='public' snmpd.public_v1.version='v1' snmpd.public_v1.secname='ro' snmpd.public_v2c=group snmpd.public_v2c.group='public' snmpd.public_v2c.version='v2c' snmpd.public_v2c.secname='ro' snmpd.public_usm=group snmpd.public_usm.group='public' snmpd.public_usm.version='usm' snmpd.public_usm.secname='ro' snmpd.private_v1=group snmpd.private_v1.group='private' snmpd.private_v1.version='v1' snmpd.private_v1.secname='rw' snmpd.private_v2c=group snmpd.private_v2c.group='private' snmpd.private_v2c.version='v2c' snmpd.private_v2c.secname='rw' snmpd.private_usm=group snmpd.private_usm.group='private' snmpd.private_usm.version='usm' snmpd.private_usm.secname='rw' snmpd.all=view snmpd.all.viewname='all' snmpd.all.type='included' snmpd.all.oid='.1' snmpd.public_access=access snmpd.public_access.group='public' snmpd.public_access.context='none' snmpd.public_access.version='any' snmpd.public_access.level='noauth' snmpd.public_access.prefix='exact' snmpd.public_access.read='all' snmpd.public_access.write='none' snmpd.public_access.notify='none' snmpd.private_access=access snmpd.private_access.group='private' snmpd.private_access.context='none' snmpd.private_access.version='any' snmpd.private_access.level='noauth' snmpd.private_access.prefix='exact' snmpd.private_access.read='all' snmpd.private_access.write='all' snmpd.private_access.notify='all' snmpd.@system[0]=system snmpd.@system[0].sysLocation='office' snmpd.@system[0].sysContact='bofh@example.com' snmpd.@system[0].sysName='OpenMPTCProuter' snmpd.@exec[0]=exec snmpd.@exec[0].name='filedescriptors' snmpd.@exec[0].prog='/bin/cat' snmpd.@exec[0].args='/proc/sys/fs/file-nr' snmpd.@engineid[0]=engineid snmpd.@engineid[0].engineidtype='3' snmpd.@engineid[0].engineidnic='eth0' snmpd.general=snmpd snmpd.general.network='lan' snmpd.general.enabled='0' snmpd.general.ipv6cpipv4='1' sqm.eth1=queue sqm.eth1.enabled='0' sqm.eth1.interface='eth1' sqm.eth1.download='85000' sqm.eth1.upload='10000' sqm.eth1.qdisc='fq_codel' sqm.eth1.script='simple.qos' sqm.eth1.qdisc_advanced='0' sqm.eth1.ingress_ecn='ECN' sqm.eth1.egress_ecn='ECN' sqm.eth1.qdisc_really_really_advanced='0' sqm.eth1.itarget='auto' sqm.eth1.etarget='auto' sqm.eth1.linklayer='none' sqm.lan=queue sqm.lan.interface='eth0' sqm.lan.qdisc='fq_codel' sqm.lan.script='simple.qos' sqm.lan.qdisc_advanced='0' sqm.lan.linklayer='none' sqm.lan.enabled='0' sqm.lan.debug_logging='0' sqm.lan.verbosity='5' sqm.lan.download='0' sqm.lan.upload='0' sqm.lan.iqdisc_opts='autorate-ingress nat dual-dsthost' sqm.lan.eqdisc_opts='nat dual-srchost' sqm.wan4=queue sqm.wan4.qdisc='fq_codel' sqm.wan4.script='simple.qos' sqm.wan4.qdisc_advanced='0' sqm.wan4.linklayer='none' sqm.wan4.enabled='0' sqm.wan4.debug_logging='0' sqm.wan4.verbosity='5' sqm.wan4.download='0' sqm.wan4.upload='0' sqm.wan4.iqdisc_opts='autorate-ingress nat dual-dsthost' sqm.wan4.eqdisc_opts='nat dual-srchost' sqm.wan1=queue sqm.wan1.qdisc='fq_codel' sqm.wan1.script='simple.qos' sqm.wan1.qdisc_advanced='0' sqm.wan1.linklayer='none' sqm.wan1.enabled='0' sqm.wan1.debug_logging='0' sqm.wan1.verbosity='5' sqm.wan1.download='0' sqm.wan1.upload='0' sqm.wan1.iqdisc_opts='autorate-ingress nat dual-dsthost' sqm.wan1.eqdisc_opts='nat dual-srchost' sqm.wan1.interface='eth1' sqm.wan2=queue sqm.wan2.qdisc='fq_codel' sqm.wan2.script='simple.qos' sqm.wan2.qdisc_advanced='0' sqm.wan2.linklayer='none' sqm.wan2.enabled='0' sqm.wan2.debug_logging='0' sqm.wan2.verbosity='5' sqm.wan2.download='0' sqm.wan2.upload='0' sqm.wan2.iqdisc_opts='autorate-ingress nat dual-dsthost' sqm.wan2.eqdisc_opts='nat dual-srchost' sqm.wan2.interface='eth2' sqm.wan3=queue sqm.wan3.interface='eth3' sqm.wan3.qdisc='fq_codel' sqm.wan3.script='simple.qos' sqm.wan3.qdisc_advanced='0' sqm.wan3.linklayer='none' sqm.wan3.enabled='0' sqm.wan3.debug_logging='0' sqm.wan3.verbosity='5' sqm.wan3.download='0' sqm.wan3.upload='0' sqm.wan3.iqdisc_opts='autorate-ingress nat dual-dsthost' sqm.wan3.eqdisc_opts='nat dual-srchost' system.@system[0]=system system.@system[0].log_size='64' system.@system[0].urandom_seed='0' system.@system[0].ttylogin='1' system.@system[0].hostname='BondingRouter' system.@system[0].zonename='Asia/Jakarta' system.@system[0].timezone='WIB-7' system.@system[0].log_proto='udp' system.@system[0].conloglevel='8' system.@system[0].cronloglevel='5' system.@system[0].zram_comp_algo='lzo' system.ntp=timeserver system.ntp.server='0.openwrt.pool.ntp.org' '1.openwrt.pool.ntp.org' '2.openwrt.pool.ntp.org' '3.openwrt.pool.ntp.org' system.ntp.use_dhcp='0' system.ntp.enable_server='1' system.@rngd[0]=rngd system.@rngd[0].device='/dev/urandom' system.@rngd[0].enabled='1' ttyd.@ttyd[0]=ttyd ttyd.@ttyd[0].interface='@lan' ttyd.@ttyd[0].command='/usr/libexec/login.sh' ucitrack.@network[0]=network ucitrack.@network[0].init='network' ucitrack.@network[0].affects='dhcp' 'radvd' 'glorytun' 'glorytun-udp' 'dsvpn' 'mptcpovervpn' 'omr6in4' 'omr-quota' 'omr-tracker' 'openmptcprouter' ucitrack.@wireless[0]=wireless ucitrack.@wireless[0].affects='network' ucitrack.@firewall[0]=firewall ucitrack.@firewall[0].init='firewall' ucitrack.@firewall[0].affects='luci-splash' 'qos' 'miniupnpd' 'sqm' ucitrack.@olsr[0]=olsr ucitrack.@olsr[0].init='olsrd' ucitrack.@dhcp[0]=dhcp ucitrack.@dhcp[0].init='dnsmasq' ucitrack.@dhcp[0].affects='odhcpd' ucitrack.@odhcpd[0]=odhcpd ucitrack.@odhcpd[0].init='odhcpd' ucitrack.@dropbear[0]=dropbear ucitrack.@dropbear[0].init='dropbear' ucitrack.@httpd[0]=httpd ucitrack.@httpd[0].init='httpd' ucitrack.@fstab[0]=fstab ucitrack.@fstab[0].exec='/sbin/block mount' ucitrack.@qos[0]=qos ucitrack.@qos[0].init='qos' ucitrack.@system[0]=system ucitrack.@system[0].init='led' ucitrack.@system[0].exec='/etc/init.d/log reload' ucitrack.@system[0].affects='luci_statistics' 'dhcp' ucitrack.@luci_splash[0]=luci_splash ucitrack.@luci_splash[0].init='luci_splash' ucitrack.@ntpclient[0]=ntpclient ucitrack.@ntpclient[0].init='ntpclient' ucitrack.@samba[0]=samba ucitrack.@samba[0].init='samba' ucitrack.@tinyproxy[0]=tinyproxy ucitrack.@tinyproxy[0].init='tinyproxy' ucitrack.@glorytun[0]=glorytun ucitrack.@glorytun[0].init='glorytun' ucitrack.@glorytun[0].affects='glorytun-udp' 'openmptcprouter-vps' ucitrack.@glorytun-udp[0]=glorytun-udp ucitrack.@glorytun-udp[0].init='glorytun-udp' ucitrack.@glorytun-udp[1]=glorytun-udp ucitrack.@glorytun-udp[1].init='glorytun-udp' ucitrack.@glorytun-udp[1].affects='openmptcprouter-vps' ucitrack.@mptcpovervpn[0]=mptcpovervpn ucitrack.@mptcpovervpn[0].init='mptcpovervpn' ucitrack.@macvlan[0]=macvlan ucitrack.@macvlan[0].init='macvlan' ucitrack.@upnpd[0]=upnpd ucitrack.@upnpd[0].init='miniupnpd' ucitrack.@shadowsocks-libev[0]=shadowsocks-libev ucitrack.@shadowsocks-libev[0].init='shadowsocks-libev' ucitrack.@shadowsocks-libev[0].affects='omr-tracker' ucitrack.@mlvpn[0]=mlvpn ucitrack.@mlvpn[0].init='mlvpn' ucitrack.@mail[0]=mail ucitrack.@mail[0].init='mail' ucitrack.@omr-bypass[0]=omr-bypass ucitrack.@omr-bypass[0].init='omr-bypass' ucitrack.@snmpd[0]=snmpd ucitrack.@snmpd[0].init='snmpd' ucitrack.@sqm[0]=sqm ucitrack.@sqm[0].init='sqm' ucitrack.@mptcp[0]=mptcp ucitrack.@mptcp[0].init='mptcp' ucitrack.@omr-quota[0]=omr-quota ucitrack.@omr-quota[0].init='omr-quota' ucitrack.@omr-tracker[0]=omr-tracker ucitrack.@omr-tracker[0].init='omr-tracker' ucitrack.@openmptcprouter[0]=openmptcprouter ucitrack.@openmptcprouter[0].init='openmptcprouter' uhttpd.main=uhttpd uhttpd.main.listen_http='0.0.0.0:80' '[::]:80' uhttpd.main.listen_https='0.0.0.0:443' '[::]:443' uhttpd.main.redirect_https='1' uhttpd.main.home='/www' uhttpd.main.rfc1918_filter='1' uhttpd.main.max_requests='3' uhttpd.main.max_connections='100' uhttpd.main.cert='/etc/uhttpd.crt' uhttpd.main.key='/etc/uhttpd.key' uhttpd.main.cgi_prefix='/cgi-bin' uhttpd.main.lua_prefix='/cgi-bin/luci=/usr/lib/lua/luci/sgi/uhttpd.lua' uhttpd.main.script_timeout='60' uhttpd.main.network_timeout='30' uhttpd.main.http_keepalive='20' uhttpd.main.tcp_keepalive='1' uhttpd.main.ubus_prefix='/ubus' uhttpd.defaults=cert uhttpd.defaults.days='730' uhttpd.defaults.key_type='ec' uhttpd.defaults.bits='2048' uhttpd.defaults.ec_curve='P-256' uhttpd.defaults.country='ZZ' uhttpd.defaults.state='Somewhere' uhttpd.defaults.location='Unknown' uhttpd.defaults.commonname='openmptcprouter' unbound.ub_main=unbound unbound.ub_main.add_extra_dns='0' unbound.ub_main.add_local_fqdn='1' unbound.ub_main.add_wan_fqdn='0' unbound.ub_main.dhcp_link='none' unbound.ub_main.dhcp4_slaac6='0' unbound.ub_main.dns64='0' unbound.ub_main.dns64_prefix='64:ff9b::/96' unbound.ub_main.domain='lan' unbound.ub_main.domain_type='static' unbound.ub_main.edns_size='1232' unbound.ub_main.extended_stats='0' unbound.ub_main.hide_binddata='1' unbound.ub_main.interface_auto='1' unbound.ub_main.localservice='1' unbound.ub_main.manual_conf='0' unbound.ub_main.num_threads='1' unbound.ub_main.query_minimize='0' unbound.ub_main.query_min_strict='0' unbound.ub_main.rate_limit='0' unbound.ub_main.rebind_localhost='0' unbound.ub_main.rebind_protection='1' unbound.ub_main.resource='default' unbound.ub_main.root_age='9' unbound.ub_main.ttl_min='120' unbound.ub_main.unbound_control='0' unbound.ub_main.validator='0' unbound.ub_main.validator_ntp='1' unbound.ub_main.verbosity='1' unbound.ub_main.iface_trig='lan' 'wan' unbound.ub_main.iface_wan='wan' unbound.ub_main.listen_port='5353' unbound.ub_main.protocol='ip4_only' unbound.ub_main.enabled='1' unbound.ub_main.recursion='aggressive' unbound.auth_icann=zone unbound.auth_icann.enabled='0' unbound.auth_icann.fallback='1' unbound.auth_icann.url_dir='https://www.internic.net/domain/' unbound.auth_icann.zone_type='auth_zone' unbound.auth_icann.server='lax.xfr.dns.icann.org' 'iad.xfr.dns.icann.org' unbound.auth_icann.zone_name='.' 'arpa.' 'in-addr.arpa.' 'ip6.arpa.' unbound.fwd_isp=zone unbound.fwd_isp.enabled='0' unbound.fwd_isp.fallback='1' unbound.fwd_isp.resolv_conf='1' unbound.fwd_isp.zone_type='forward_zone' unbound.fwd_isp.zone_name='isp-bill.example.com.' 'isp-mail.example.net.' unbound.fwd_google=zone unbound.fwd_google.enabled='0' unbound.fwd_google.fallback='1' unbound.fwd_google.tls_index='dns.google' unbound.fwd_google.tls_upstream='1' unbound.fwd_google.zone_type='forward_zone' unbound.fwd_google.server='8.8.4.4' '8.8.8.8' '2001:4860:4860::8844' '2001:4860:4860::8888' unbound.fwd_google.zone_name='.' unbound.fwd_cloudflare=zone unbound.fwd_cloudflare.enabled='0' unbound.fwd_cloudflare.fallback='1' unbound.fwd_cloudflare.tls_index='cloudflare-dns.com' unbound.fwd_cloudflare.tls_upstream='1' unbound.fwd_cloudflare.zone_type='forward_zone' unbound.fwd_cloudflare.server='1.1.1.1' '1.0.0.1' '2606:4700:4700::1111' '2606:4700:4700::1001' unbound.fwd_cloudflare.zone_name='.' upnpd.config=upnpd upnpd.config.enabled='0' upnpd.config.enable_natpmp='1' upnpd.config.enable_upnp='1' upnpd.config.secure_mode='1' upnpd.config.log_output='0' upnpd.config.download='1024' upnpd.config.upload='512' upnpd.config.internal_iface='lan' upnpd.config.port='5000' upnpd.config.upnp_lease_file='/var/run/miniupnpd.leases' upnpd.config.igdv1='1' upnpd.config.ext_ip_reserved_ignore='1' upnpd.@perm_rule[0]=perm_rule upnpd.@perm_rule[0].action='allow' upnpd.@perm_rule[0].ext_ports='1024-65535' upnpd.@perm_rule[0].int_addr='0.0.0.0/0' upnpd.@perm_rule[0].int_ports='1024-65535' upnpd.@perm_rule[0].comment='Allow high ports' upnpd.@perm_rule[1]=perm_rule upnpd.@perm_rule[1].action='deny' upnpd.@perm_rule[1].ext_ports='0-65535' upnpd.@perm_rule[1].int_addr='0.0.0.0/0' upnpd.@perm_rule[1].int_ports='0-65535' upnpd.@perm_rule[1].comment='Default deny' v2ray.main=v2ray v2ray.main.v2ray_file='/usr/bin/v2ray' v2ray.main.mem_percentage='0' v2ray.main.loglevel='debug' v2ray.main.access_log='/dev/null' v2ray.main.error_log='/dev/null' v2ray.main.enabled='0' v2ray.main.inbounds='omr' 'omrtest' v2ray.main.outbounds='omrout' 'omrexit' v2ray.main_dns=dns v2ray.main_dns.hosts='example.com|127.0.0.1' v2ray.main_dns.enabled='0' v2ray.main_policy=policy v2ray.main_policy.enabled='1' v2ray.main_policy.levels='policy_level_0' v2ray.policy_level_0=policy_level v2ray.policy_level_0.level='0' v2ray.policy_level_0.handshake='4' v2ray.policy_level_0.conn_idle='2400' v2ray.policy_level_0.uplink_only='0' v2ray.policy_level_0.downlink_only='0' v2ray.policy_level_0.buffer_size='512' v2ray.main_transparent_proxy=transparent_proxy v2ray.main_transparent_proxy.proxy_mode='default' v2ray.main_transparent_proxy.apnic_delegated_mirror='apnic' v2ray.main_transparent_proxy.gfwlist_mirror='github' v2ray.main_transparent_proxy.redirect_udp='1' v2ray.main_transparent_proxy.redirect_port='1897' v2ray.omrout=outbound v2ray.omrout.tag='omrout_tunnel' v2ray.omrout.protocol='vless' v2ray.omrout.s_vmess_port='65228' v2ray.omrout.s_vmess_user_alter_id='0' v2ray.omrout.s_vless_port='65228' v2ray.omrout.s_vless_user_encryption='none' v2ray.omrout.s_vless_user_alter_id='0' v2ray.omrout.ss_network='tcp' v2ray.omrout.ss_security='tls' v2ray.omrout.ss_tls_allow_insecure='1' v2ray.omrout.ss_tls_disable_system_root='1' v2ray.omrout.ss_tls_cert_usage='verify' v2ray.omrout.ss_tls_cert_file='/etc/luci-uploads/client.crt' v2ray.omrout.ss_tls_key_file='/etc/luci-uploads/client.key' v2ray.omrout.mux_concurrency='8' v2ray.omrout.s_vmess_user_security='chacha20-poly1305' v2ray.omrout.s_vless_user_security='chacha20-poly1305' v2ray.omrout.s_vmess_address='27.112.X.X' v2ray.omrout.s_vless_address='27.112.X.X' v2ray.omrout.s_vmess_user_id='9fb92bc5-6a5e-4313-97bf-7c8d6c0ea437' v2ray.omrout.s_vless_user_id='9fb92bc5-6a5e-4313-97bf-7c8d6c0ea437' v2ray.omr=inbound v2ray.omr.tag='omrtunnel' v2ray.omr.listen='0.0.0.0' v2ray.omr.port='1897' v2ray.omr.protocol='dokodemo-door' v2ray.omr.s_dokodemo_door_network='tcp' 'udp' v2ray.omr.ss_sockopt_tproxy='redirect' v2ray.omr.ss_sockopt_tcp_fast_open='1' v2ray.omr.s_dokodemo_door_follow_redirect='1' v2ray.omr6=inbound v2ray.omr6.tag='omrtunnel6' v2ray.omr6.listen='::' v2ray.omr6.port='1898' v2ray.omr6.protocol='dokodemo-door' v2ray.omr6.s_dokodemo_door_network='tcp' 'udp' v2ray.omr6.ss_sockopt_tproxy='tproxy' v2ray.omr6.ss_sockopt_tcp_fast_open='1' v2ray.omr6.s_dokodemo_door_follow_redirect='1' v2ray.omrtest=inbound v2ray.omrtest.port='1111' v2ray.omrtest.protocol='socks' v2ray.omrtest.listen='127.0.0.1' v2ray.omrtest.s_socks_auth='noauth' v2ray.omrtest.s_socks_udp='1' v2ray.omrtest.s_socks_ip='127.0.0.1' v2ray.omrtest.s_socks_userlevel='0' v2ray.main_reverse=reverse v2ray.main_reverse.enabled='1' v2ray.main_reverse.bridges='omrbridge|omr.lan' v2ray.omrexit=outbound v2ray.omrexit.protocol='freedom' v2ray.omrexit.tag='out' v2ray.omrrouting=routing_rule v2ray.omrrouting.type='field' v2ray.omrrouting.inbound_tag='omrbridge' v2ray.omrrouting.outbound_tag='omrout_tunnel' v2ray.omrrouting.domain='full:omr.lan' v2ray.omrroutingo=routing_rule v2ray.omrroutingo.type='field' v2ray.omrroutingo.inbound_tag='omrbridge' v2ray.omrroutingo.outbound_tag='out' v2ray.main_routing=routing v2ray.main_routing.enabled='1' v2ray.main_routing.rules='omrrouting' 'omrroutingo' vnstat.@vnstat[0]=vnstat vnstat.@vnstat[0].interface='wan1' 'wan2' 'eth1' 'eth2' 'eth3' Powered by openmptcprouter v0.57.3 r0+15225-bfc433efd4

Ysurac commented 3 years ago

You seems to be using MPTCP over VPN option. Disable it.

ccmks commented 3 years ago

Already disabled, still no luck

ccmks commented 3 years ago

Older version used to work OK in this scenario when it was on 0.55 or 0.56

Ysurac commented 3 years ago

MPTCP over VPN is not disabled in log and config. You tried to reboot VPS and router ?

ccmks commented 3 years ago

I rebooted both OMR and VPS, still like this, no luck, even downgraded to 0.56.5 still not resolve, so I reverted back to 0.57.3

ccmks commented 3 years ago

Here is the latest log

Thu Apr 29 14:33:09 2021 daemon.notice openvpn(wan3)[20846]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:33:09 2021 daemon.err openvpn(wan3)[20846]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:33:09 2021 daemon.notice openvpn(wan3)[20846]: Exiting due to fatal error Thu Apr 29 14:33:09 2021 daemon.notice procd: /etc/rc.d/S95done: Failed to initialize libusb: LIBUSB_ERROR_OTHER Thu Apr 29 14:33:10 2021 daemon.info glorytun: starting glorytun vpn instance vpn Thu Apr 29 14:33:10 2021 user.notice firewall: Reloading firewall due to ifup of wan3 (eth3) Thu Apr 29 14:33:11 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:33:12 2021 daemon.notice procd: /etc/rc.d/S95done: Failed to initialize libusb: LIBUSB_ERROR_OTHER Thu Apr 29 14:33:13 2021 user.err vnstat_backup: cannot restore, backup file does not exist (yet) Thu Apr 29 14:33:13 2021 user.notice adb-enablemodem: INFO: waiting for device Thu Apr 29 14:33:14 2021 daemon.info omr-tracker-ss: Shadowsocks is down (can't contact via http 1.0.0.1, 212.27.48.10, 198.27.92.1) Thu Apr 29 14:33:14 2021 user.notice Shadowsocks: Rules DOWN Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:33:14 2021 daemon.err openvpn(wan3)[23362]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: Exiting due to fatal error Thu Apr 29 14:10:01 2021 user.notice omr-bypass: Restart dnsmasq... Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[6685]: exiting on receipt of SIGTERM Thu Apr 29 14:10:02 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Apr 29 14:10:02 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Apr 29 14:10:02 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: started, version 2.82 cachesize 150 Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: DNS service limited to local subnets Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Apr 29 14:10:02 2021 daemon.info dnsmasq-dhcp[23666]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h Thu Apr 29 14:10:02 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain test Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain onion Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain localhost Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain local Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain invalid Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain bind Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain use-application-dns.net Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain lan Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using nameserver 127.0.0.1#5353 Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using 1 more local addresses Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: read /etc/hosts - 4 addresses Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:10:02 2021 daemon.info dnsmasq-dhcp[23666]: read /etc/ethers - 0 addresses Thu Apr 29 14:10:02 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:10:02 2021 user.notice Shadowsocks: Rules UP Thu Apr 29 14:10:03 2021 user.notice Shadowsocks: Reload omr-bypass rules Thu Apr 29 14:10:03 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:05 2021 daemon.err openvpn(wan3)[25097]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: Exiting due to fatal error Thu Apr 29 14:10:06 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 14:10:06 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:10:06 2021 daemon.info dnsmasq[23666]: read /etc/hosts - 4 addresses Thu Apr 29 14:10:06 2021 daemon.info dnsmasq[23666]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:10:06 2021 daemon.info dnsmasq-dhcp[23666]: read /etc/ethers - 0 addresses Thu Apr 29 14:10:08 2021 user.notice omr-bypass: Restart dnsmasq... Thu Apr 29 14:10:08 2021 daemon.info dnsmasq[23666]: exiting on receipt of SIGTERM Thu Apr 29 14:10:09 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12) Thu Apr 29 14:10:09 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Apr 29 14:10:09 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3 Thu Apr 29 14:10:09 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Apr 29 14:10:09 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: started, version 2.82 cachesize 150 Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: DNS service limited to local subnets Thu Apr 29 14:10:09 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Apr 29 14:10:09 2021 daemon.info dnsmasq-dhcp[26587]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain test Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain onion Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain localhost Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain local Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain invalid Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain bind Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain use-application-dns.net Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain lan Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using nameserver 127.0.0.1#5353 Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using 1 more local addresses Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:10:09 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:10 2021 daemon.err openvpn(wan3)[27008]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: Exiting due to fatal error Thu Apr 29 14:10:11 2021 daemon.info omr-tracker-ss: Server (27.112.X.X) seems down, no answer to ping Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:15 2021 daemon.err openvpn(wan3)[27207]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: Exiting due to fatal error Thu Apr 29 14:10:16 2021 daemon.info omr-tracker-ss: Shadowsocks is down (can't contact via http 1.0.0.1, 212.27.48.10, 198.27.92.1, 151.101.129.164) Thu Apr 29 14:10:17 2021 user.notice Shadowsocks: Rules DOWN Thu Apr 29 14:10:19 2021 daemon.info glorytun[20304]: STOPPED tun0 Thu Apr 29 14:10:20 2021 daemon.err glorytun[20304]: 27.112.X.X.65001: connected Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:20 2021 daemon.err openvpn(wan3)[27565]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: Exiting due to fatal error Thu Apr 29 14:10:22 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps: % Total % Received % Xferd Average Speed Time Time Time Current Thu Apr 29 14:10:22 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps: Dload Upload Total Spent Left Speed Thu Apr 29 14:10:23 2021 user.notice mptcp: Reloading mptcp config due to ifup of wan3 (eth3) Thu Apr 29 14:10:25 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0) Thu Apr 29 14:10:25 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0 Thu Apr 29 14:10:25 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps: curl: (28) Operation timed out after 3001 milliseconds with 0 out of 0 bytes received Thu Apr 29 14:10:25 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer) Thu Apr 29 14:10:25 2021 daemon.info glorytun: starting glorytun vpn instance vpn Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:25 2021 daemon.err openvpn(wan3)[29199]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: Exiting due to fatal error Thu Apr 29 14:10:26 2021 user.notice omr-tracker: Launching... Thu Apr 29 14:10:26 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:10:26 2021 user.notice Shadowsocks: Rules UP Thu Apr 29 14:10:26 2021 daemon.notice procd: /etc/rc.d/S99shadowsocks-libev: Another app is currently holding the xtables lock. Perhaps you want to use the -w option? Thu Apr 29 14:10:26 2021 daemon.notice procd: /etc/rc.d/S99shadowsocks-libev: Flush terminated Thu Apr 29 14:10:26 2021 user.notice Shadowsocks: Reload omr-bypass rules Thu Apr 29 14:10:26 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:10:29 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 14:10:30 2021 daemon.err glorytun[20304]: 27.112.X.X.65001: key exchange failed Thu Apr 29 14:10:30 2021 daemon.info glorytun[20304]: STOPPED tun0 Thu Apr 29 14:10:30 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses Thu Apr 29 14:10:30 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:10:30 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses Thu Apr 29 14:10:30 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:10:30 2021 user.info : using tcp fast open Thu Apr 29 14:10:30 2021 user.info : using tcp fast open Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: enable TCP no-delay Thu Apr 29 14:10:30 2021 user.info : using tcp fast open Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: resolving hostname to IPv6 address first Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: enable TCP no-delay Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: resolving hostname to IPv6 address first Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: initializing ciphers... chacha20-ietf-poly1305 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: initializing ciphers... chacha20-ietf-poly1305 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: enable TCP no-delay Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: resolving hostname to IPv6 address first Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: listening at 0.0.0.0:1101 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: listening at 0.0.0.0:1101 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: tcp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: tcp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: UDP relay enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: UDP relay enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: initializing ciphers... chacha20-ietf-poly1305 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: udp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: udp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: running from root user Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: running from root user Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: listening at 0.0.0.0:1101 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: tcp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: UDP relay enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: udp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: running from root user Thu Apr 29 14:10:30 2021 user.info : using tcp fast open Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: using tcp fast open Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: enable TCP no-delay Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: enable TCP no-delay Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: resolving hostname to IPv6 address first Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: initializing ciphers... chacha20-ietf-poly1305 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: initializing ciphers... chacha20-ietf-poly1305 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: listening at 127.0.0.1:1111 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: listening at 0.0.0.0:1101 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: tcp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: tcp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: UDP relay enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: udprelay enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: udp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: udp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: running from root user Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: running from root user Thu Apr 29 14:10:30 2021 user.info : using tcp fast open Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: enable TCP no-delay Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: resolving hostname to IPv6 address first Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: initializing ciphers... chacha20-ietf-poly1305 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: listening at 0.0.0.0:1100 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: tcp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: UDP relay enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: udp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: running from root user Thu Apr 29 14:10:30 2021 user.info : using tcp fast open Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: enable TCP no-delay Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: resolving hostname to IPv6 address first Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: initializing ciphers... chacha20-ietf-poly1305 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: listening at :::1100 Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: tcp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: UDP relay enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: udp port reuse enabled Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: running from root user Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: ttyd 1.6.1 (libwebsockets 3.1.0) Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: tty configuration: Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: start command: /usr/libexec/login.sh Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: close signal: SIGHUP (1) Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: terminal type: xterm-256color Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: Using foreign event loop... Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: Creating Vhost 'default' port 7681, 2 protocols, IPv6 off Thu Apr 29 14:10:30 2021 daemon.err glorytun[20304]: 27.112.X.X.65001: connected Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: Listening on port: 7681 Thu Apr 29 14:10:30 2021 daemon.notice procd: /etc/rc.d/S99v2ray: Flush terminated Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:31 2021 daemon.err openvpn(wan3)[31321]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: Exiting due to fatal error Thu Apr 29 14:10:31 2021 daemon.info procd: - init complete - Thu Apr 29 14:10:31 2021 user.notice omr-tracker: Launched Thu Apr 29 14:10:32 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: omrvpn down Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: wan1 (eth1) switched off Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: Delete default route via dev eth1 Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: Check API configuration... Thu Apr 29 14:10:32 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses Thu Apr 29 14:10:32 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:10:32 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses Thu Apr 29 14:10:32 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:10:33 2021 daemon.warn dnsmasq[26587]: failed to create listening socket for 10.255.255.2: Address not available Thu Apr 29 14:10:33 2021 daemon.warn dnsmasq[26587]: failed to create listening socket for 10.255.255.2: Address not available Thu Apr 29 14:10:33 2021 daemon.debug dnsmasq[26587]: listening on tun0(#24): 10.255.255.2 port 53 Thu Apr 29 14:10:33 2021 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it Thu Apr 29 14:10:33 2021 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0) Thu Apr 29 14:10:33 2021 daemon.info glorytun: starting glorytun vpn instance vpn Thu Apr 29 14:10:33 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: service stopped (unbound 1.13.0). Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: server stats for thread 0: 87 queries, 21 answers from cache, 66 recursions, 0 prefetch, 0 rejected by ip ratelimiting Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: server stats for thread 0: requestlist max 3 avg 0.560606 exceeded 0 jostled 0 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: average recursion processing time 0.180641 sec Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: histogram of recursion processing times Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: [25%]=0.0142155 median[50%]=0.0294912 [75%]=0.126391 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: lower(secs) upper(secs) recursions Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.004096 0.008192 4 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.008192 0.016384 17 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.016384 0.032768 15 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.032768 0.065536 7 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.065536 0.131072 7 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.131072 0.262144 4 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.262144 0.524288 3 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.524288 1.000000 5 Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 1.000000 2.000000 4 Thu Apr 29 14:10:35 2021 daemon.notice unbound: [845:0] notice: init module 0: iterator Thu Apr 29 14:10:35 2021 daemon.info unbound: [845:0] info: start of service (unbound 1.13.0). Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:36 2021 daemon.err openvpn(wan3)[1455]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: Exiting due to fatal error Thu Apr 29 14:10:36 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 14:10:37 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses Thu Apr 29 14:10:37 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:10:37 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses Thu Apr 29 14:10:37 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:10:38 2021 daemon.info procd: Instance glorytun::instance1 pid 20304 not stopped on SIGTERM, sending SIGKILL instead Thu Apr 29 14:10:38 2021 daemon.notice netifd: Network device 'tun0' link is down Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is now down Thu Apr 29 14:10:38 2021 daemon.debug dnsmasq[26587]: stopped listening on tun0(#24): 10.255.255.2 port 53 Thu Apr 29 14:10:38 2021 daemon.info glorytun[1763]: INITIALIZED tun0 Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: remove network interface tun0: event processed Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: event reported: action=remove, name=tun0, subsystem=net Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled Thu Apr 29 14:10:38 2021 daemon.notice netifd: Network device 'tun0' link is up Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is setting up now Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is now up Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: add network interface tun0: event processed Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: error: parent device sysfspath not found Thu Apr 29 14:10:38 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected Thu Apr 29 14:10:39 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0) Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:41 2021 daemon.err openvpn(wan3)[2339]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: Exiting due to fatal error Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:46 2021 daemon.err openvpn(wan3)[2702]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: Exiting due to fatal error Thu Apr 29 14:10:48 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed Thu Apr 29 14:10:48 2021 daemon.info glorytun[1763]: STOPPED tun0 Thu Apr 29 14:10:49 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer) Thu Apr 29 14:10:49 2021 user.notice post-tracking-post-tracking: Check API configuration... Done Thu Apr 29 14:10:49 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected Thu Apr 29 14:10:49 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:49 2021 daemon.err openvpn(wan3)[3178]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: Exiting due to fatal error Thu Apr 29 14:10:49 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:10:50 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12) Thu Apr 29 14:10:50 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3 Thu Apr 29 14:10:53 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 14:10:53 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses Thu Apr 29 14:10:53 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:10:53 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses Thu Apr 29 14:10:53 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:10:54 2021 daemon.debug dnsmasq[26587]: listening on tun0(#25): 10.255.255.2 port 53 Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:54 2021 daemon.err openvpn(wan3)[4840]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: Exiting due to fatal error Thu Apr 29 14:10:59 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed Thu Apr 29 14:10:59 2021 daemon.info glorytun[1763]: STOPPED tun0 Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:10:59 2021 daemon.err openvpn(wan3)[5089]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: Exiting due to fatal error Thu Apr 29 14:10:59 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:04 2021 daemon.err openvpn(wan3)[5344]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: Exiting due to fatal error Thu Apr 29 14:11:05 2021 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0) Thu Apr 29 14:11:07 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:09 2021 daemon.err openvpn(wan3)[7027]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: Exiting due to fatal error Thu Apr 29 14:11:09 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed Thu Apr 29 14:11:09 2021 daemon.info glorytun[1763]: STOPPED tun0 Thu Apr 29 14:11:10 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected Thu Apr 29 14:11:11 2021 user.notice omr-bypass: Restart dnsmasq... Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[26587]: exiting on receipt of SIGTERM Thu Apr 29 14:11:11 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses! Thu Apr 29 14:11:11 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses Thu Apr 29 14:11:11 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: started, version 2.82 cachesize 150 Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: DNS service limited to local subnets Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile Thu Apr 29 14:11:11 2021 daemon.info dnsmasq-dhcp[7574]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain test Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain onion Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain localhost Thu Apr 29 14:11:11 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain local Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain invalid Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain bind Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain use-application-dns.net Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain lan Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using nameserver 127.0.0.1#5353 Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using 1 more local addresses Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: read /etc/hosts - 4 addresses Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:11:11 2021 daemon.info dnsmasq-dhcp[7574]: read /etc/ethers - 0 addresses Thu Apr 29 14:11:12 2021 daemon.info glorytun: starting glorytun vpn instance vpn Thu Apr 29 14:11:12 2021 user.notice omr-tracker: Launching... Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:14 2021 daemon.err openvpn(wan3)[7819]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: Exiting due to fatal error Thu Apr 29 14:11:18 2021 user.notice omr-tracker: Launched Thu Apr 29 14:11:18 2021 user.notice post-tracking-post-tracking: wan1 (eth1) switched off Thu Apr 29 14:11:18 2021 user.notice post-tracking-post-tracking: Delete default route via dev eth1 Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:19 2021 daemon.err openvpn(wan3)[8376]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: Exiting due to fatal error Thu Apr 29 14:11:20 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed Thu Apr 29 14:11:20 2021 daemon.info glorytun[1763]: STOPPED tun0 Thu Apr 29 14:11:21 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:24 2021 daemon.err openvpn(wan3)[9003]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: Exiting due to fatal error Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:29 2021 daemon.err openvpn(wan3)[9303]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: Exiting due to fatal error Thu Apr 29 14:11:31 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed Thu Apr 29 14:11:31 2021 daemon.info glorytun[1763]: STOPPED tun0 Thu Apr 29 14:11:31 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected Thu Apr 29 14:11:32 2021 user.notice post-tracking-post-tracking: omrvpn down because gateway down Thu Apr 29 14:11:33 2021 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it Thu Apr 29 14:11:33 2021 daemon.info glorytun: starting glorytun vpn instance vpn Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:34 2021 daemon.err openvpn(wan3)[9906]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: Exiting due to fatal error Thu Apr 29 14:11:36 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12) Thu Apr 29 14:11:36 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3 Thu Apr 29 14:11:38 2021 daemon.info procd: Instance glorytun::instance1 pid 1763 not stopped on SIGTERM, sending SIGKILL instead Thu Apr 29 14:11:38 2021 daemon.notice netifd: Network device 'tun0' link is down Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is now down Thu Apr 29 14:11:38 2021 daemon.debug dnsmasq[7574]: stopped listening on tun0(#25): 10.255.255.2 port 53 Thu Apr 29 14:11:38 2021 daemon.info glorytun[10398]: INITIALIZED tun0 Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: remove network interface tun0: event processed Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: event reported: action=remove, name=tun0, subsystem=net Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled Thu Apr 29 14:11:38 2021 daemon.notice netifd: Network device 'tun0' link is up Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is setting up now Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is now up Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: add network interface tun0: event processed Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: error: parent device sysfspath not found Thu Apr 29 14:11:38 2021 daemon.err glorytun[10398]: 27.112.X.X.65001: connected Thu Apr 29 14:11:38 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0) Thu Apr 29 14:11:39 2021 user.notice omr-bypass: Starting OMR-ByPass... Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:39 2021 daemon.err openvpn(wan3)[10873]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: Exiting due to fatal error Thu Apr 29 14:11:43 2021 user.notice omr-bypass: Reload dnsmasq... Thu Apr 29 14:11:43 2021 daemon.info dnsmasq[7574]: read /etc/hosts - 4 addresses Thu Apr 29 14:11:43 2021 daemon.info dnsmasq[7574]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses Thu Apr 29 14:11:43 2021 daemon.info dnsmasq-dhcp[7574]: read /etc/ethers - 0 addresses Thu Apr 29 14:11:43 2021 user.notice omr-bypass: OMR-ByPass is running Thu Apr 29 14:11:44 2021 daemon.debug dnsmasq[7574]: listening on tun0(#26): 10.255.255.2 port 53 Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:44 2021 daemon.err openvpn(wan3)[12660]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: Exiting due to fatal error Thu Apr 29 14:11:48 2021 daemon.err glorytun[10398]: 27.112.X.X.65001: key exchange failed Thu Apr 29 14:11:48 2021 daemon.info glorytun[10398]: STOPPED tun0 Thu Apr 29 14:11:49 2021 daemon.err glorytun[10398]: 27.112.X.X.65001: connected Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:50 2021 daemon.err openvpn(wan3)[13038]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: Exiting due to fatal error Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6 Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: library versions: OpenSSL 1.1.1i 8 Dec 2020 Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301 Thu Apr 29 14:11:55 2021 daemon.err openvpn(wan3)[13447]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99) Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: Exiting due to fatal error

ccmks commented 3 years ago

Should I re-install the VPS?

Ysurac commented 3 years ago

No. Your still have MPTCP over VPN enabled for WAN3.

ccmks commented 3 years ago

Hmmm, that's is strange, I disabled it earlier. MPTCP over VPN still being checked regardless I have unchecked it on Wizard

ccmks commented 3 years ago

I can't disable MPTCP over VPN, it keeps turn on

ccmks commented 3 years ago

I ended up factory reset the OMR, hopefully it is working

ccmks commented 3 years ago

I think there is a bug in MPTCP over VPN. Once it is checked, it can't be unchecked no matter what you do. Also, how come MPTCP over VPN affect this issue?

Ysurac commented 3 years ago

Maybe. There is not this MPTCP over VPN issue in 0.58rc1. This affect this issue because MPTCP over VPN was not working, OpenVPN crashed.

ccmks commented 3 years ago

Also, how do I run iperf from either of WAN to my VPS, just to make sure that I am getting the expected throughput by testing the iperf

github-actions[bot] commented 3 years ago

This issue is stale because it has been open 90 days with no activity. Remove stale label or comment or this will be closed in 5 days