Closed geoffroyguich closed 3 years ago
can you please share the logs? according to what I see in the UI it looks like something is not correct in your configuration.
Here are 2 log files.
One of the 384 firmware with a successful connection and one with the 386.
Thank you
Kind regards Geoffroy
Geoffroy Guichard - Chat @ Spike [xni7n]
On March 8, 2021 at 20:40 GMT, Antonio Aloisio notifications@github.com wrote:
can you please share the logs?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
May 5 05:05:09 syslogd started: BusyBox v1.25.1
May 5 05:05:09 kernel: klogd started: BusyBox v1.25.1 (2020-05-02 02:41:58 EDT)
May 5 05:05:09 kernel: Linux version 2.6.36.4brcmarm (root@a2c8f8f439b9) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020
May 5 05:05:09 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
May 5 05:05:09 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
May 5 05:05:09 kernel: Machine: Northstar Prototype
May 5 05:05:09 kernel: Ignoring unrecognised tag 0x00000000
May 5 05:05:09 kernel: bootconsole [earlycon0] enabled
May 5 05:05:09 kernel: Memory policy: ECC disabled, Data cache writealloc
May 5 05:05:09 kernel: MPCORE found at 19020000
May 5 05:05:09 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536
May 5 05:05:09 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096
May 5 05:05:09 kernel: pcpu-alloc: [0] 0 [0] 1
May 5 05:05:09 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416
May 5 05:05:09 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
May 5 05:05:09 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes)
May 5 05:05:09 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes)
May 5 05:05:09 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes)
May 5 05:05:09 kernel: Memory: 128MB 128MB = 256MB total
May 5 05:05:09 kernel: Memory: 255464k/255464k available, 6680k reserved, 0K highmem
May 5 05:05:09 kernel: Virtual kernel memory layout:
May 5 05:05:09 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB)
May 5 05:05:09 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB)
May 5 05:05:09 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB)
May 5 05:05:09 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB)
May 5 05:05:09 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB)
May 5 05:05:09 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB)
May 5 05:05:09 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB)
May 5 05:05:09 kernel: .text : 0xc003d000 - 0xc03af000 (3528 kB)
May 5 05:05:09 kernel: .data : 0xc03c8000 - 0xc03eb2e0 ( 141 kB)
May 5 05:05:09 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
May 5 05:05:09 kernel: Hierarchical RCU implementation.
May 5 05:05:09 kernel: RCU-based detection of stalled CPUs is disabled.
May 5 05:05:09 kernel: Verbose stalled-CPUs detection is disabled.
May 5 05:05:09 kernel: NR_IRQS:256
May 5 05:05:09 kernel: MPCORE GIC init
May 5 05:05:09 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
May 5 05:05:09 kernel: MPCORE Global Timer Clock 400000000Hz
May 5 05:05:09 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008)
May 5 05:05:09 kernel: pid_max: default: 32768 minimum: 301
May 5 05:05:09 kernel: Mount-cache hash table entries: 512
May 5 05:05:09 kernel: CPU: Testing write buffer coherency: ok
May 5 05:05:09 kernel: MPCORE Private timer setup CPU0
May 5 05:05:09 kernel: Calibrating local timer... 399.853MHz.
May 5 05:05:09 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000
May 5 05:05:09 kernel: CPU1: Booted secondary processor
May 5 05:05:09 kernel: MPCORE Private timer setup CPU1
May 5 05:05:09 kernel: Brought up 2 CPUs
May 5 05:05:09 kernel: SMP: Total of 2 processors activated (3191.60 BogoMIPS).
May 5 05:05:09 kernel: devtmpfs: initialized
May 5 05:05:09 kernel: atomic64 test passed
May 5 05:05:09 kernel: NET: Registered protocol family 16
May 5 05:05:09 kernel: Found a Unknown NAND flash:
May 5 05:05:09 kernel: Total size: 128MB
May 5 05:05:09 kernel: Block size: 128KB
May 5 05:05:09 kernel: Page Size: 2048B
May 5 05:05:09 kernel: OOB Size: 64B
May 5 05:05:09 kernel: Sector size: 512B
May 5 05:05:09 kernel: Spare size: 16B
May 5 05:05:09 kernel: ECC level: 8 (8-bit)
May 5 05:05:09 kernel: Device ID: 0xef 0xf1 0x 0 0x95 0x 0 0x00
May 5 05:05:09 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48
May 5 05:05:09 kernel: CCA UART Clock rate 100000000Hz
May 5 05:05:09 kernel: bio: create slab
Mar 8 21:44:00 rc_service: httpd 316:notify_rc stop_vpnclient1 Mar 8 21:44:00 ovpn-client1[1980]: SIGTERM[hard,init_instance] received, process exiting Mar 8 21:44:40 rc_service: httpd 316:notify_rc start_vpnclient1 Mar 8 21:44:42 ovpn-client1[2443]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Mar 8 21:44:42 ovpn-client1[2443]: OpenVPN 2.5.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 8 2021 Mar 8 21:44:42 ovpn-client1[2443]: library versions: OpenSSL 1.1.1i 8 Dec 2020, LZO 2.08 Mar 8 21:44:42 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:43 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:43 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:43 ovpn-client1[2444]: UDP link remote: [AF_INET]86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: TLS: Initial packet from [AF_INET]86.194.123.126:12346, sid=75260ccd 3071b640 Mar 8 21:44:43 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:43 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:43 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:43 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:43 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:43 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:43 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:43 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:43 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:43 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:48 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:48 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:48 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:48 ovpn-client1[2444]: UDP link remote: [AF_INET]86.194.123.126:12346 Mar 8 21:44:49 ovpn-client1[2444]: TLS: Initial packet from [AF_INET]86.194.123.126:12346, sid=fdeba33e f8428c9a Mar 8 21:44:49 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:49 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:49 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:49 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:49 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:49 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:49 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:49 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:49 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:49 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:54 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:54 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:54 ovpn-client1[2444]: UDP link remote: [AF_INET]86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: TLS: Initial packet from [AF_INET]86.194.123.126:12346, sid=9eee7f8c 45f50c10 Mar 8 21:44:54 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:54 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:54 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:54 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:54 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:54 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:54 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:54 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:54 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:54 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:59 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:59 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:59 ovpn-client1[2444]: UDP link remote: [AF_INET]86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: TLS: Initial packet from [AF_INET]86.194.123.126:12346, sid=b7be62db 7f2a0545
Hi, the following lines: Mar 8 21:44:43 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:43 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS handshake failed
from the lines it looks like there is something not right in the certificate. Is it old or somehow corrupted?
maybe
openssl verify -CAfile
could help to check that
On Mon, Mar 8, 2021 at 10:47 PM geoffroyguich notifications@github.com wrote:
Here are 2 log files.
One of the 384 firmware with a successful connection and one with the 386.
Thank you
Kind regards Geoffroy
Geoffroy Guichard - Chat @ Spike [xni7n]
On March 8, 2021 at 20:40 GMT, Antonio Aloisio notifications@github.com wrote:
can you please share the logs?
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or unsubscribe. May 5 05:05:09 syslogd started: BusyBox v1.25.1 May 5 05:05:09 kernel: klogd started: BusyBox v1.25.1 (2020-05-02 02:41:58 EDT) May 5 05:05:09 kernel: Linux version 2.6.36.4brcmarm (root@a2c8f8f439b9) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 May 5 05:05:09 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f May 5 05:05:09 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache May 5 05:05:09 kernel: Machine: Northstar Prototype May 5 05:05:09 kernel: Ignoring unrecognised tag 0x00000000 May 5 05:05:09 kernel: bootconsole [earlycon0] enabled May 5 05:05:09 kernel: Memory policy: ECC disabled, Data cache writealloc May 5 05:05:09 kernel: MPCORE found at 19020000 May 5 05:05:09 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536 May 5 05:05:09 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096 May 5 05:05:09 kernel: pcpu-alloc: [0] 0 [0] 1 May 5 05:05:09 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416 May 5 05:05:09 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug May 5 05:05:09 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes) May 5 05:05:09 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes) May 5 05:05:09 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes) May 5 05:05:09 kernel: Memory: 128MB 128MB = 256MB total May 5 05:05:09 kernel: Memory: 255464k/255464k available, 6680k reserved, 0K highmem May 5 05:05:09 kernel: Virtual kernel memory layout: May 5 05:05:09 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB) May 5 05:05:09 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB) May 5 05:05:09 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB) May 5 05:05:09 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB) May 5 05:05:09 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB) May 5 05:05:09 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB) May 5 05:05:09 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB) May 5 05:05:09 kernel: .text : 0xc003d000 - 0xc03af000 (3528 kB) May 5 05:05:09 kernel: .data : 0xc03c8000 - 0xc03eb2e0 ( 141 kB) May 5 05:05:09 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 5 05:05:09 kernel: Hierarchical RCU implementation. May 5 05:05:09 kernel: RCU-based detection of stalled CPUs is disabled. May 5 05:05:09 kernel: Verbose stalled-CPUs detection is disabled. May 5 05:05:09 kernel: NR_IRQS:256 May 5 05:05:09 kernel: MPCORE GIC init May 5 05:05:09 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored. May 5 05:05:09 kernel: MPCORE Global Timer Clock 400000000Hz May 5 05:05:09 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008) May 5 05:05:09 kernel: pid_max: default: 32768 minimum: 301 May 5 05:05:09 kernel: Mount-cache hash table entries: 512 May 5 05:05:09 kernel: CPU: Testing write buffer coherency: ok May 5 05:05:09 kernel: MPCORE Private timer setup CPU0 May 5 05:05:09 kernel: Calibrating local timer... 399.853MHz. May 5 05:05:09 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000 May 5 05:05:09 kernel: CPU1: Booted secondary processor May 5 05:05:09 kernel: MPCORE Private timer setup CPU1 May 5 05:05:09 kernel: Brought up 2 CPUs May 5 05:05:09 kernel: SMP: Total of 2 processors activated (3191.60 BogoMIPS). May 5 05:05:09 kernel: devtmpfs: initialized May 5 05:05:09 kernel: atomic64 test passed May 5 05:05:09 kernel: NET: Registered protocol family 16 May 5 05:05:09 kernel: Found a Unknown NAND flash: May 5 05:05:09 kernel: Total size: 128MB May 5 05:05:09 kernel: Block size: 128KB May 5 05:05:09 kernel: Page Size: 2048B May 5 05:05:09 kernel: OOB Size: 64B May 5 05:05:09 kernel: Sector size: 512B May 5 05:05:09 kernel: Spare size: 16B May 5 05:05:09 kernel: ECC level: 8 (8-bit) May 5 05:05:09 kernel: Device ID: 0xef 0xf1 0x 0 0x95 0x 0 0x00 May 5 05:05:09 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48 May 5 05:05:09 kernel: CCA UART Clock rate 100000000Hz May 5 05:05:09 kernel: bio: create slab
at 0 May 5 05:05:09 kernel: Switching to clocksource mpcore_gtimer May 5 05:05:09 kernel: NET: Registered protocol family 2 May 5 05:05:09 kernel: IP route cache hash table entries: 2048 (order: 1, 8192 bytes) May 5 05:05:09 kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes) May 5 05:05:09 kernel: TCP bind hash table entries: 8192 (order: 4, 98304 bytes) May 5 05:05:09 kernel: TCP: Hash tables configured (established 8192 bind 8192) May 5 05:05:09 kernel: TCP reno registered May 5 05:05:09 kernel: UDP hash table entries: 128 (order: 0, 4096 bytes) May 5 05:05:09 kernel: UDP-Lite hash table entries: 128 (order: 0, 4096 bytes) May 5 05:05:09 kernel: NET: Registered protocol family 1 May 5 05:05:09 kernel: PCI: no core May 5 05:05:09 kernel: PCI: no core May 5 05:05:09 kernel: PCI: scanning bus 0 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCIE1 link=1 May 5 05:05:09 kernel: PCIE1 switching to GEN2 May 5 05:05:09 kernel: PCIE1 link=1 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCI: bus0: Fast back to back transfers disabled May 5 05:05:09 kernel: PCI: Fixing up bus 1 May 5 05:05:09 kernel: PCI: bus1: Fast back to back transfers disabled May 5 05:05:09 kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff] May 5 05:05:09 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit] May 5 05:05:09 kernel: pci 0001:01:00.0: BAR 0: set to [mem 0x08000000-0x08007fff 64bit] (PCI address [0x8000000-0x8007fff] May 5 05:05:09 kernel: pci 0001:00:00.0: PCI bridge to [bus 01-01] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [io disabled] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [mem pref disabled] May 5 05:05:09 kernel: PCIE2 link=1 May 5 05:05:09 kernel: PCIE2 switching to GEN2 May 5 05:05:09 kernel: PCIE2 link=1 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCI: bus0: Fast back to back transfers disabled May 5 05:05:09 kernel: PCI: Fixing up bus 2 May 5 05:05:09 kernel: PCI: bus2: Fast back to back transfers disabled May 5 05:05:09 kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff] May 5 05:05:09 kernel: pci 0002:02:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit] May 5 05:05:09 kernel: pci 0002:02:00.0: BAR 0: set to [mem 0x40000000-0x40007fff 64bit] (PCI address [0x40000000-0x40007fff] May 5 05:05:09 kernel: pci 0002:00:00.0: PCI bridge to [bus 02-02] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [io disabled] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [mem pref disabled] May 5 05:05:09 kernel: PCIE3 link=0 May 5 05:05:09 kernel: VFS: Disk quotas dquot_6.5.2 May 5 05:05:09 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes) May 5 05:05:09 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 5 05:05:09 kernel: fuse init (API version 7.15) May 5 05:05:09 kernel: msgmni has been set to 498 May 5 05:05:09 kernel: io scheduler noop registered (default) May 5 05:05:09 kernel: io scheduler deadline registered May 5 05:05:09 kernel: io scheduler cfq registered May 5 05:05:09 kernel: Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled May 5 05:05:09 kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117) is a 16550 May 5 05:05:09 kernel: console [ttyS0] enabled, bootconsole disabled May 5 05:05:09 kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117) is a 16550 May 5 05:05:09 kernel: brd: module loaded May 5 05:05:09 kernel: loop: module loaded May 5 05:05:09 kernel: pflash: found no supported devices May 5 05:05:09 kernel: bcmsflash: found no supported devices May 5 05:05:09 kernel: Boot partition size = 524288(0x80000) May 5 05:05:09 kernel: lookup_nflash_rootfs_offset: offset = 0x200000 May 5 05:05:09 kernel: nflash: squash filesystem with lzma found at block 28 May 5 05:05:09 kernel: Creating 4 MTD partitions on "nflash": May 5 05:05:09 kernel: 0x000000000000-0x000000080000 : "boot" May 5 05:05:09 kernel: 0x000000080000-0x000000200000 : "nvram" May 5 05:05:09 kernel: 0x000000200000-0x000004000000 : "linux" May 5 05:05:09 kernel: 0x00000039fbf4-0x000004000000 : "rootfs" May 5 05:05:09 kernel: PPP generic driver version 2.4.2 May 5 05:05:09 kernel: PPP MPPE Compression module registered May 5 05:05:09 kernel: NET: Registered protocol family 24 May 5 05:05:09 kernel: PPTP driver version 0.8.5 May 5 05:05:09 kernel: Mirror/redirect action on May 5 05:05:09 kernel: u32 classifier May 5 05:05:09 kernel: Performance counters on May 5 05:05:09 kernel: Actions configured May 5 05:05:09 kernel: Netfilter messages via NETLINK v0.30. May 5 05:05:09 kernel: nf_conntrack version 0.5.0 (3991 buckets, 15964 max) May 5 05:05:09 kernel: ctnetlink v0.93: registering with nfnetlink. May 5 05:05:09 kernel: xt_time: kernel timezone is -0000 May 5 05:05:09 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team May 5 05:05:09 kernel: TCP cubic registered May 5 05:05:09 kernel: NET: Registered protocol family 10 May 5 05:05:09 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team May 5 05:05:09 kernel: NET: Registered protocol family 17 May 5 05:05:09 kernel: L2TP core driver, V2.0 May 5 05:05:09 kernel: PPPoL2TP kernel driver, V2.0 May 5 05:05:09 kernel: 802.1Q VLAN Support v1.8 Ben Greear < greearb@candelatech.com> May 5 05:05:09 kernel: All bugs added by David S. Miller <davem@redhat.com May 5 05:05:09 kernel: Registering the dns_resolver key type May 5 05:05:09 kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012 May 5 05:05:09 kernel: NAND device: Manufacturer ID: 0xef, Chip ID: 0xf1 (Unknown NAND 128MiB 3,3V 8-bit) May 5 05:05:09 kernel: Spare area=64 eccbytes 56, ecc bytes located at: May 5 05:05:09 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63 May 5 05:05:09 kernel: Available 7 bytes at (off,len): May 5 05:05:09 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) May 5 05:05:09 kernel: Scanning device for bad blocks May 5 05:05:09 kernel: Options: NO_AUTOINCR,NO_READRDY, May 5 05:05:09 kernel: Creating 2 MTD partitions on "brcmnand": May 5 05:05:09 kernel: 0x000004000000-0x000007ec0000 : "brcmnand" May 5 05:05:09 kernel: 0x000007ec0000-0x000008000000 : "asus" May 5 05:05:09 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3. May 5 05:05:09 kernel: devtmpfs: mounted May 5 05:05:09 kernel: Freeing init memory: 212K May 5 05:05:09 kernel: ctf: module license 'Proprietary' taints kernel. May 5 05:05:09 kernel: Disabling lock debugging due to kernel taint May 5 05:05:09 kernel: et_module_init: passivemode set to 0x0 May 5 05:05:09 kernel: et_module_init: txworkq set to 0x1 May 5 05:05:09 kernel: et_module_init: et_txq_thresh set to 0xce4 May 5 05:05:09 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: et_probe: mvlan vid[0]: 0 May 5 05:05:09 kernel: et_probe: mvlan vid[1]: 0 May 5 05:05:09 kernel: et_probe: mvlan en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 8 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: dpsta_init: Jun 12 2019 23:31:45 msglevel 0x1 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 4 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: wl_module_init: passivemode set to 0x0 May 5 05:05:09 kernel: wl_module_init: igs set to 0x0 May 5 05:05:09 kernel: wl_module_init: txworkq set to 0x1 May 5 05:05:09 kernel: wl0: wlc_ap_attach dynamic_ed_thresh_enable = 0 May 5 05:05:09 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: wl1: wlc_ap_attach dynamic_ed_thresh_enable = 0 May 5 05:05:09 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc. May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: tp_init uses obsolete (PF_INET,SOCK_PACKET) May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: device vlan1 entered promiscuous mode May 5 05:05:09 kernel: device eth0 entered promiscuous mode May 5 05:05:10 kernel: device eth1 entered promiscuous mode May 5 05:05:10 kernel: device eth2 entered promiscuous mode May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:10 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:10 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 1(vlan1) entering forwarding state May 5 05:05:10 kernel: br0: port 1(vlan1) entering forwarding state May 5 05:05:10 nat: apply redirect rules May 5 05:05:11 syslog: wlceventd Start... May 5 05:05:12 dnsmasq[227]: started, version 2.81-32-g93cb543 cachesize 1500 May 5 05:05:12 dnsmasq[227]: asynchronous logging enabled, queue limit is 5 messages May 5 05:05:12 dnsmasq-dhcp[227]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d May 5 05:05:12 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:05:12 DSL-AC68U: start httpd:80 May 5 05:05:13 avahi-daemon[279]: Found user 'nobody' (UID 65534) and group 'nobody' (GID 65534). May 5 05:05:13 avahi-daemon[279]: Successfully dropped root privileges. May 5 05:05:13 avahi-daemon[279]: avahi-daemon 0.7 starting up. May 5 05:05:13 jffs2: valid logs(1) May 5 05:05:13 disk_monitor: be idle May 5 05:05:13 hour_monitor: daemon is starting May 5 05:05:13 hour_monitor: daemon terminates May 5 05:05:13 kernel: device eth1 left promiscuous mode May 5 05:05:13 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:13 avahi-daemon[279]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! May 5 05:05:13 avahi-daemon[279]: No service file found in /tmp/avahi/services. May 5 05:05:13 avahi-daemon[279]: Loading new alias name DSL-AC68U. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.1.1. May 5 05:05:13 avahi-daemon[279]: New relevant interface br0.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface vlan2.IPv4 with address 169.254.70.103. May 5 05:05:13 avahi-daemon[279]: New relevant interface vlan2.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1. May 5 05:05:13 avahi-daemon[279]: New relevant interface lo.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Network interface enumeration completed. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 192.168.1.1 on br0.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 169.254.70.103 on vlan2.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 127.0.1.1 on lo.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 127.0.0.1 on lo.IPv4. May 5 05:05:13 kernel: device eth2 left promiscuous mode May 5 05:05:13 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 httpd: Generating SSL certificate... May 5 05:05:14 kernel: device eth1 entered promiscuous mode May 5 05:05:14 kernel: br0: topology change detected, propagating May 5 05:05:14 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:14 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:14 avahi-daemon[279]: Server startup complete. Host name is DSL-AC68U-F2E8.local. Local service cookie is 2795110832. May 5 05:05:14 avahi-daemon[279]: Alias name "DSL-AC68U" successfully established. May 5 05:05:14 kernel: device eth2 entered promiscuous mode May 5 05:05:14 kernel: br0: topology change detected, propagating May 5 05:05:14 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 syslog: wlceventd Start... May 5 05:05:15 WAN_Connection: ISP's DHCP did not function properly. May 5 05:05:16 WAN_Connection: Ethernet link down. May 5 05:05:16 dnsmasq-dhcp[227]: DHCPREQUEST(br0) 192.168.200.191 d0:81:7a:d5:5e:e0 May 5 05:05:16 dnsmasq-dhcp[227]: DHCPNAK(br0) 192.168.200.191 d0:81:7a:d5:5e:e0 wrong network May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected DFS-exit channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: acs_set_chspec: 0x1001 (1) for reason APCS_INIT May 5 05:05:20 dnsmasq-dhcp[227]: DHCPDISCOVER(br0) d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPOFFER(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPDISCOVER(br0) d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPOFFER(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:21 dnsmasq-dhcp[227]: DHCPREQUEST(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:21 dnsmasq-dhcp[227]: DHCPACK(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 Geoffroys-iPro May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected DFS-exit channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: acs_set_chspec: 0xe03a (52/80) for reason APCS_INIT May 5 05:05:22 kernel: usbcore: registered new interface driver usbfs May 5 05:05:22 kernel: usbcore: registered new interface driver hub May 5 05:05:22 kernel: usbcore: registered new device driver usb May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_acm May 5 05:05:22 kernel: cdc_acm: v0.26:USB Abstract Control Model driver for USB modems and ISDN adapters May 5 05:05:22 kernel: usbcore: registered new interface driver asix May 5 05:05:22 syslog: module ax88179_178a not found in modules.dep May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_ether May 5 05:05:22 Mastiff: init May 5 05:05:22 kernel: usbcore: registered new interface driver rndis_host May 5 05:05:22 kernel: cdc_ncm: 14-Mar-2012 May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_ncm May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_wdm May 5 05:05:22 kernel: usbcore: registered new interface driver qmi_wwan May 5 05:05:22 kernel: cdc_mbim: loaded May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_mbim May 5 05:05:22 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: xHCI Host Controller May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: new USB bus registered, assigned bus number 1 May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: irq 112, io mem 0x18023000 May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry May 5 05:05:24 kernel: usb usb1: No SuperSpeed endpoint companion for config 1 interface 0 altsetting 0 ep 129: using minimum values May 5 05:05:24 kernel: hub 1-0:1.0: USB hub found May 5 05:05:24 kernel: hub 1-0:1.0: 1 port detected May 5 05:05:24 kernel: [xhci-hub] usb2mode:[0] May 5 05:05:24 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: EHCI Host Controller May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: new USB bus registered, assigned bus number 2 May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: irq 111, io mem 0x18021000 May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: USB 0.0 started, EHCI 1.00 May 5 05:05:24 kernel: hub 2-0:1.0: USB hub found May 5 05:05:24 kernel: hub 2-0:1.0: 2 ports detected May 5 05:05:24 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: OHCI Host Controller May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: new USB bus registered, assigned bus number 3 May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: irq 111, io mem 0x18022000 May 5 05:05:24 kernel: hub 3-0:1.0: USB hub found May 5 05:05:24 kernel: hub 3-0:1.0: 2 ports detected May 5 05:05:24 kernel: SCSI subsystem initialized May 5 05:05:24 kernel: csw_retry 100 May 5 05:05:24 kernel: Initializing USB Mass Storage driver... May 5 05:05:24 kernel: usbcore: registered new interface driver usb-storage May 5 05:05:24 kernel: USB Mass Storage support registered. May 5 05:05:25 kernel: Tuxera FAT 12/16/32 driver version 3015.1.29.5_1 [Flags: R/W MODULE]. May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: Tuxera NTFS driver 3018.6.5.3 [Flags: R/W MODULE]. May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: Tuxera HFS+ driver 3017.6.20 May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: usbcore: registered new interface driver usblp May 5 05:05:49 rc_service: httpd 241:notify_rc start_dsl_autodet May 5 05:05:51 rc_service: httpd 241:notify_rc start_dsl_autodet May 5 05:06:23 DSL: Link down -> up May 5 05:06:26 WAN_Connection: Ethernet link up. May 5 05:06:26 rc_service: wanduck 189:notify_rc restart_wan_if 0 May 5 05:06:27 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:06:30 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:06:31 WAN_Connection: ISP's DHCP did not function properly. May 5 05:06:42 rc_service: httpd 241:notify_rc restart_dsl_setting; May 5 05:06:53 DSL: Link up -> down May 5 05:07:05 WAN_Connection: Ethernet link down. May 5 05:07:16 rc_service: httpd 241:notify_rc chpass May 5 05:07:16 rc_service: httpd 241:notify_rc restart_ftpsamba May 5 05:07:16 rc_service: waitting "chpass" via httpd ... May 5 05:07:17 lldpd[965]: could not open either /etc/os-release or /usr/lib/os-release May 5 05:07:17 lldpd[965]: lsb_release information not available May 5 05:07:17 lldpd[969]: created chroot directory /var/run/lldpd May 5 05:07:17 lldpd[969]: protocol LLDP enabled May 5 05:07:17 lldpd[969]: protocol CDPv1 disabled May 5 05:07:17 lldpd[969]: protocol CDPv2 disabled May 5 05:07:17 lldpd[969]: protocol SONMP disabled May 5 05:07:17 lldpd[969]: protocol EDP disabled May 5 05:07:17 lldpd[969]: protocol FDP disabled May 5 05:07:17 lldpd[969]: libevent 2.0.21-stable initialized with epoll method May 5 05:07:18 lldpd[969]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted May 5 05:07:18 lldpd[969]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted May 5 05:07:18 lldpcli[967]: lldpd should resume operations May 5 05:07:20 FTP_Server: daemon is stopped May 5 05:07:20 Samba_Server: smb daemon is stopped May 5 05:07:20 dnsmasq[227]: exiting on receipt of SIGTERM May 5 05:07:20 kernel: gro disabled May 5 05:07:20 dnsmasq[987]: started, version 2.81-32-g93cb543 cachesize 1500 May 5 05:07:20 dnsmasq[987]: asynchronous logging enabled, queue limit is 5 messages May 5 05:07:20 dnsmasq-dhcp[987]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d May 5 05:07:20 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:24 rc_service: httpd 241:notify_rc restart_dsl_wireless 0; May 5 05:07:26 kernel: device eth1 left promiscuous mode May 5 05:07:26 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:26 kernel: device eth2 left promiscuous mode May 5 05:07:26 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:28 kernel: device eth1 entered promiscuous mode May 5 05:07:28 kernel: br0: topology change detected, propagating May 5 05:07:28 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:28 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:28 kernel: device eth2 entered promiscuous mode May 5 05:07:28 kernel: br0: topology change detected, propagating May 5 05:07:28 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:28 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:29 syslog: wlceventd Start... May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected DFS-exit channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: acs_set_chspec: 0x1001 (1) for reason APCS_INIT May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected DFS-exit channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: acs_set_chspec: 0xe03a (52/80) for reason APCS_INIT May 5 05:07:36 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:43 rc_service: watchdog 247:notify_rc start_cfgsync May 5 05:07:43 rc_service: waitting "restart_dsl_wireless 0;" via httpd ... May 5 05:07:45 pppd[1083]: Plugin rp-pppoe.so loaded. May 5 05:07:45 pppd[1083]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.7 May 5 05:07:45 pppd[1086]: pppd 2.4.7 started by admin, uid 0 May 5 05:07:58 kernel: nf_conntrack_rtsp v0.6.21 loading May 5 05:07:58 kernel: nf_nat_rtsp v0.6.21 loading May 5 05:07:58 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:58 zcip_client: configured 169.254.104.180 May 5 05:08:21 pppd[1086]: Timeout waiting for PADO packets May 5 05:08:43 DSL: Link down -> up May 5 05:08:45 WAN_Connection: Ethernet link up. May 5 05:08:45 rc_service: wanduck 189:notify_rc restart_wan_if 0 May 5 05:08:45 pppd[1086]: Unable to complete PPPoE Discovery May 5 05:08:46 pppd[1086]: Hangup (SIGHUP) May 5 05:08:46 pppd[1086]: Terminating on signal 15 May 5 05:08:46 pppd[1086]: Exit. May 5 05:08:46 lldpd[969]: removal request for address of 169.254.104.180%6, but no knowledge of it May 5 05:08:46 pppd[1285]: Plugin rp-pppoe.so loaded. May 5 05:08:46 pppd[1285]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.7 May 5 05:08:47 pppd[1287]: pppd 2.4.7 started by admin, uid 0 May 5 05:08:47 pppd[1287]: PPP session is 1 (0x1) May 5 05:08:47 pppd[1287]: Connected to 00:02:3b:10:44:12 via interface vlan3880 May 5 05:08:47 pppd[1287]: Using interface ppp0 May 5 05:08:47 pppd[1287]: Connect: ppp0 <--> vlan3880 May 5 05:08:50 pppd[1287]: PAP authentication succeeded May 5 05:08:50 pppd[1287]: peer from calling number 00:02:3B:10:44:12 authorized May 5 05:08:50 WAN_Connection: Fail to connect with some issues. May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:51 pppd[1287]: local IP address 78.180.161.21 May 5 05:08:51 pppd[1287]: remote IP address 78.180.160.1 May 5 05:08:51 pppd[1287]: primary DNS address 195.175.39.49 May 5 05:08:51 pppd[1287]: secondary DNS address 195.175.39.50 May 5 05:08:51 lldpd[969]: removal request for address of 78.180.160.1%12, but no knowledge of it May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:52 nat: apply nat rules (/tmp/nat_rules_ppp0_vlan3880) May 5 05:08:52 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:08:52 dnsmasq[987]: using nameserver 195.175.39.50#53 May 5 05:08:52 dnsmasq[987]: using nameserver 195.175.39.49#53 May 5 05:08:53 wan: finish adding multi routes May 5 05:08:53 rc_service: ip-up 1300:notify_rc stop_ntpd May 5 05:08:53 rc_service: ip-up 1300:notify_rc start_ntpd May 5 05:08:53 rc_service: waitting "stop_ntpd" via ip-up ... May 5 05:08:54 ntpd: Started ntpd May 5 05:08:54 miniupnpd[1348]: HTTP listening on port 35152 May 5 05:08:54 miniupnpd[1348]: Listening for NAT-PMP/PCP traffic on port 5351 May 5 05:08:56 WAN_Connection: WAN was restored. Mar 8 21:33:06 ntpd: Initial clock set Mar 8 21:33:06 rc_service: ntpd_synced 1374:notify_rc restart_diskmon Mar 8 21:33:06 disk_monitor: Finish Mar 8 21:33:07 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:33:07 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:33:07 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:33:07 rc_service: httpd 241:notify_rc start_webs_update Mar 8 21:33:08 disk_monitor: be idle Mar 8 21:33:10 crond[236]: time disparity of 1495705 minutes detected Mar 8 21:33:10 nat: apply nat rules (/tmp/nat_rules_ppp0_vlan3880) Mar 8 21:33:10 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:33:10 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:33:10 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:33:10 zcip_client: configured 169.254.104.180 Mar 8 21:33:58 openvpn: Resetting client (unit 1) to default settings Mar 8 21:34:31 rc_service: httpd 241:notify_rc start_vpnrouting1 Mar 8 21:34:41 rc_service: httpd 241:notify_rc start_vpnclient1 Mar 8 21:34:41 kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 8 21:34:41 kernel: tun: (C) 1999-2004 Max Krasnyansky < maxk@qualcomm.com> Mar 8 21:34:43 ovpn-client1[1822]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 2 2020 Mar 8 21:34:43 ovpn-client1[1822]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.08 Mar 8 21:34:43 ovpn-client1[1823]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:34:43 ovpn-client1[1823]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:34:43 ovpn-client1[1823]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:34:43 ovpn-client1[1823]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:34:43 ovpn-client1[1823]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:34:44 ovpn-client1[1823]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:34:44 ovpn-client1[1823]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:34:44 ovpn-client1[1823]: UDP link local: (not bound) Mar 8 21:34:44 ovpn-client1[1823]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:34:44 ovpn-client1[1823]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=ed923a13 c6b24903 Mar 8 21:34:44 ovpn-client1[1823]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:34:44 ovpn-client1[1823]: VERIFY KU OK Mar 8 21:34:44 ovpn-client1[1823]: Validating certificate extended key usage Mar 8 21:34:44 ovpn-client1[1823]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:34:44 ovpn-client1[1823]: VERIFY EKU OK Mar 8 21:34:44 ovpn-client1[1823]: VERIFY X509NAME OK: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Mar 8 21:34:44 ovpn-client1[1823]: VERIFY OK: depth=0, CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Mar 8 21:34:44 ovpn-client1[1823]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 256 bit EC, curve: prime256v1 Mar 8 21:34:44 ovpn-client1[1823]: raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Peer Connection Initiated with [AF_INET]86.194.123.126:12346 Mar 8 21:34:45 ovpn-client1[1823]: SENT CONTROL
(status=1) Mar 8 21:34:45 ovpn-client1[1823]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.10 255.255.255.0,peer-id 8,cipher AES-256-GCM' Mar 8 21:34:45 ovpn-client1[1823]: Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:3: block-outside-dns (2.4.9) Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: timers and/or timeouts modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: --ifconfig/up options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: route options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: route-related options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: peer-id set Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: adjusting link_mtu to 1624 Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: data channel crypto options modified Mar 8 21:34:45 ovpn-client1[1823]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 8 21:34:45 ovpn-client1[1823]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 8 21:34:45 ovpn-client1[1823]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 8 21:34:45 ovpn-client1[1823]: TUN/TAP device tun11 opened Mar 8 21:34:45 ovpn-client1[1823]: TUN/TAP TX queue length set to 1000 Mar 8 21:34:45 ovpn-client1[1823]: /sbin/ifconfig tun11 10.8.0.10 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255 Mar 8 21:34:45 lldpd[969]: removal request for address of 10.8.0.10%13, but no knowledge of it Mar 8 21:34:45 lldpd[969]: removal request for address of 10.8.0.10%13, but no knowledge of it Mar 8 21:34:45 ovpn-client1[1823]: updown.sh tun11 1500 1552 10.8.0.10 255.255.255.0 init Mar 8 21:34:46 rc_service: service 1902:notify_rc updateresolv Mar 8 21:34:46 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:34:46 dnsmasq[987]: using nameserver 8.8.4.4#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 8.8.8.8#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 86.194.123.126 netmask 255.255.255.255 gw 78.180.160.1 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1 Mar 8 21:34:49 openvpn-routing: Configuring policy rules for client 1 Mar 8 21:34:49 ovpn-client1[1823]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 8 21:34:49 ovpn-client1[1823]: Initialization Sequence Completed
Mar 8 21:44:00 rc_service: httpd 316:notify_rc stop_vpnclient1 Mar 8 21:44:00 ovpn-client1[1980]: SIGTERM[hard,init_instance] received, process exiting Mar 8 21:44:40 rc_service: httpd 316:notify_rc start_vpnclient1 Mar 8 21:44:42 ovpn-client1[2443]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Mar 8 21:44:42 ovpn-client1[2443]: OpenVPN 2.5.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 8 2021 Mar 8 21:44:42 ovpn-client1[2443]: library versions: OpenSSL 1.1.1i 8 Dec 2020, LZO 2.08 Mar 8 21:44:42 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:43 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:43 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:43 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=75260ccd 3071b640 Mar 8 21:44:43 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:43 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:43 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:43 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:43 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:43 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:43 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:43 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:43 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:43 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:48 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:48 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:48 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:48 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:49 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=fdeba33e f8428c9a Mar 8 21:44:49 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:49 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:49 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:49 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:49 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:49 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:49 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:49 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:49 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:49 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:54 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:54 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:54 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=9eee7f8c 45f50c10 Mar 8 21:44:54 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:54 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:54 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:54 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:54 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:54 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:54 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:54 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:54 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:54 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:59 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:59 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:59 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=b7be62db 7f2a0545
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/gnuton/asuswrt-merlin.ng/issues/88#issuecomment-793103879, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAEMYRBDM5BXLOWD6MDDL4TTCVAXVANCNFSM4Y2B37NQ .
The certificate is less than 1 year old, I understand for openvpn they are valid 10 years. The certificate works on the 384 ... I did factory reset the 68U, erased the JFF, and reload the ovpn file. Still the exact same issue. I saw on snbforum a similar case with some using the merlin firmware, and like me trying to connect openvpn to a raspberry PI. Maybe the problem is on merlin? Best Geoffroy
Geoffroy Guichard - Chat @ Spike [xo9vi]
On March 9, 2021 at 7:26 GMT, Antonio Aloisio notifications@github.com wrote:
Hi, the following lines: Mar 8 21:44:43 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:43 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS handshake failed
from the lines it looks like there is something not right in the certificate. Is it old or somehow corrupted?
maybe
openssl verify -CAfile
could help to check that
On Mon, Mar 8, 2021 at 10:47 PM geoffroyguich notifications@github.com wrote:
Here are 2 log files.
One of the 384 firmware with a successful connection and one with the 386.
Thank you
Kind regards Geoffroy
Geoffroy Guichard - Chat @ Spike [xni7n]
On March 8, 2021 at 20:40 GMT, Antonio Aloisio notifications@github.com wrote:
can you please share the logs?
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or unsubscribe. May 5 05:05:09 syslogd started: BusyBox v1.25.1 May 5 05:05:09 kernel: klogd started: BusyBox v1.25.1 (2020-05-02 02:41:58 EDT) May 5 05:05:09 kernel: Linux version 2.6.36.4brcmarm (root@a2c8f8f439b9) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 May 5 05:05:09 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f May 5 05:05:09 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache May 5 05:05:09 kernel: Machine: Northstar Prototype May 5 05:05:09 kernel: Ignoring unrecognised tag 0x00000000 May 5 05:05:09 kernel: bootconsole [earlycon0] enabled May 5 05:05:09 kernel: Memory policy: ECC disabled, Data cache writealloc May 5 05:05:09 kernel: MPCORE found at 19020000 May 5 05:05:09 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536 May 5 05:05:09 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096 May 5 05:05:09 kernel: pcpu-alloc: [0] 0 [0] 1 May 5 05:05:09 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416 May 5 05:05:09 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug May 5 05:05:09 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes) May 5 05:05:09 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes) May 5 05:05:09 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes) May 5 05:05:09 kernel: Memory: 128MB 128MB = 256MB total May 5 05:05:09 kernel: Memory: 255464k/255464k available, 6680k reserved, 0K highmem May 5 05:05:09 kernel: Virtual kernel memory layout: May 5 05:05:09 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB) May 5 05:05:09 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB) May 5 05:05:09 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB) May 5 05:05:09 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB) May 5 05:05:09 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB) May 5 05:05:09 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB) May 5 05:05:09 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB) May 5 05:05:09 kernel: .text : 0xc003d000 - 0xc03af000 (3528 kB) May 5 05:05:09 kernel: .data : 0xc03c8000 - 0xc03eb2e0 ( 141 kB) May 5 05:05:09 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 5 05:05:09 kernel: Hierarchical RCU implementation. May 5 05:05:09 kernel: RCU-based detection of stalled CPUs is disabled. May 5 05:05:09 kernel: Verbose stalled-CPUs detection is disabled. May 5 05:05:09 kernel: NR_IRQS:256 May 5 05:05:09 kernel: MPCORE GIC init May 5 05:05:09 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored. May 5 05:05:09 kernel: MPCORE Global Timer Clock 400000000Hz May 5 05:05:09 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008) May 5 05:05:09 kernel: pid_max: default: 32768 minimum: 301 May 5 05:05:09 kernel: Mount-cache hash table entries: 512 May 5 05:05:09 kernel: CPU: Testing write buffer coherency: ok May 5 05:05:09 kernel: MPCORE Private timer setup CPU0 May 5 05:05:09 kernel: Calibrating local timer... 399.853MHz. May 5 05:05:09 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000 May 5 05:05:09 kernel: CPU1: Booted secondary processor May 5 05:05:09 kernel: MPCORE Private timer setup CPU1 May 5 05:05:09 kernel: Brought up 2 CPUs May 5 05:05:09 kernel: SMP: Total of 2 processors activated (3191.60 BogoMIPS). May 5 05:05:09 kernel: devtmpfs: initialized May 5 05:05:09 kernel: atomic64 test passed May 5 05:05:09 kernel: NET: Registered protocol family 16 May 5 05:05:09 kernel: Found a Unknown NAND flash: May 5 05:05:09 kernel: Total size: 128MB May 5 05:05:09 kernel: Block size: 128KB May 5 05:05:09 kernel: Page Size: 2048B May 5 05:05:09 kernel: OOB Size: 64B May 5 05:05:09 kernel: Sector size: 512B May 5 05:05:09 kernel: Spare size: 16B May 5 05:05:09 kernel: ECC level: 8 (8-bit) May 5 05:05:09 kernel: Device ID: 0xef 0xf1 0x 0 0x95 0x 0 0x00 May 5 05:05:09 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48 May 5 05:05:09 kernel: CCA UART Clock rate 100000000Hz May 5 05:05:09 kernel: bio: create slab
at 0 May 5 05:05:09 kernel: Switching to clocksource mpcore_gtimer May 5 05:05:09 kernel: NET: Registered protocol family 2 May 5 05:05:09 kernel: IP route cache hash table entries: 2048 (order: 1, 8192 bytes) May 5 05:05:09 kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes) May 5 05:05:09 kernel: TCP bind hash table entries: 8192 (order: 4, 98304 bytes) May 5 05:05:09 kernel: TCP: Hash tables configured (established 8192 bind 8192) May 5 05:05:09 kernel: TCP reno registered May 5 05:05:09 kernel: UDP hash table entries: 128 (order: 0, 4096 bytes) May 5 05:05:09 kernel: UDP-Lite hash table entries: 128 (order: 0, 4096 bytes) May 5 05:05:09 kernel: NET: Registered protocol family 1 May 5 05:05:09 kernel: PCI: no core May 5 05:05:09 kernel: PCI: no core May 5 05:05:09 kernel: PCI: scanning bus 0 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCIE1 link=1 May 5 05:05:09 kernel: PCIE1 switching to GEN2 May 5 05:05:09 kernel: PCIE1 link=1 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCI: bus0: Fast back to back transfers disabled May 5 05:05:09 kernel: PCI: Fixing up bus 1 May 5 05:05:09 kernel: PCI: bus1: Fast back to back transfers disabled May 5 05:05:09 kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff] May 5 05:05:09 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit] May 5 05:05:09 kernel: pci 0001:01:00.0: BAR 0: set to [mem 0x08000000-0x08007fff 64bit] (PCI address [0x8000000-0x8007fff] May 5 05:05:09 kernel: pci 0001:00:00.0: PCI bridge to [bus 01-01] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [io disabled] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [mem pref disabled] May 5 05:05:09 kernel: PCIE2 link=1 May 5 05:05:09 kernel: PCIE2 switching to GEN2 May 5 05:05:09 kernel: PCIE2 link=1 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCI: bus0: Fast back to back transfers disabled May 5 05:05:09 kernel: PCI: Fixing up bus 2 May 5 05:05:09 kernel: PCI: bus2: Fast back to back transfers disabled May 5 05:05:09 kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff] May 5 05:05:09 kernel: pci 0002:02:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit] May 5 05:05:09 kernel: pci 0002:02:00.0: BAR 0: set to [mem 0x40000000-0x40007fff 64bit] (PCI address [0x40000000-0x40007fff] May 5 05:05:09 kernel: pci 0002:00:00.0: PCI bridge to [bus 02-02] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [io disabled] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [mem pref disabled] May 5 05:05:09 kernel: PCIE3 link=0 May 5 05:05:09 kernel: VFS: Disk quotas dquot_6.5.2 May 5 05:05:09 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes) May 5 05:05:09 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 5 05:05:09 kernel: fuse init (API version 7.15) May 5 05:05:09 kernel: msgmni has been set to 498 May 5 05:05:09 kernel: io scheduler noop registered (default) May 5 05:05:09 kernel: io scheduler deadline registered May 5 05:05:09 kernel: io scheduler cfq registered May 5 05:05:09 kernel: Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled May 5 05:05:09 kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117) is a 16550 May 5 05:05:09 kernel: console [ttyS0] enabled, bootconsole disabled May 5 05:05:09 kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117) is a 16550 May 5 05:05:09 kernel: brd: module loaded May 5 05:05:09 kernel: loop: module loaded May 5 05:05:09 kernel: pflash: found no supported devices May 5 05:05:09 kernel: bcmsflash: found no supported devices May 5 05:05:09 kernel: Boot partition size = 524288(0x80000) May 5 05:05:09 kernel: lookup_nflash_rootfs_offset: offset = 0x200000 May 5 05:05:09 kernel: nflash: squash filesystem with lzma found at block 28 May 5 05:05:09 kernel: Creating 4 MTD partitions on "nflash": May 5 05:05:09 kernel: 0x000000000000-0x000000080000 : "boot" May 5 05:05:09 kernel: 0x000000080000-0x000000200000 : "nvram" May 5 05:05:09 kernel: 0x000000200000-0x000004000000 : "linux" May 5 05:05:09 kernel: 0x00000039fbf4-0x000004000000 : "rootfs" May 5 05:05:09 kernel: PPP generic driver version 2.4.2 May 5 05:05:09 kernel: PPP MPPE Compression module registered May 5 05:05:09 kernel: NET: Registered protocol family 24 May 5 05:05:09 kernel: PPTP driver version 0.8.5 May 5 05:05:09 kernel: Mirror/redirect action on May 5 05:05:09 kernel: u32 classifier May 5 05:05:09 kernel: Performance counters on May 5 05:05:09 kernel: Actions configured May 5 05:05:09 kernel: Netfilter messages via NETLINK v0.30. May 5 05:05:09 kernel: nf_conntrack version 0.5.0 (3991 buckets, 15964 max) May 5 05:05:09 kernel: ctnetlink v0.93: registering with nfnetlink. May 5 05:05:09 kernel: xt_time: kernel timezone is -0000 May 5 05:05:09 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team May 5 05:05:09 kernel: TCP cubic registered May 5 05:05:09 kernel: NET: Registered protocol family 10 May 5 05:05:09 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team May 5 05:05:09 kernel: NET: Registered protocol family 17 May 5 05:05:09 kernel: L2TP core driver, V2.0 May 5 05:05:09 kernel: PPPoL2TP kernel driver, V2.0 May 5 05:05:09 kernel: 802.1Q VLAN Support v1.8 Ben Greear < greearb@candelatech.com> May 5 05:05:09 kernel: All bugs added by David S. Miller <davem@redhat.com May 5 05:05:09 kernel: Registering the dns_resolver key type May 5 05:05:09 kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012 May 5 05:05:09 kernel: NAND device: Manufacturer ID: 0xef, Chip ID: 0xf1 (Unknown NAND 128MiB 3,3V 8-bit) May 5 05:05:09 kernel: Spare area=64 eccbytes 56, ecc bytes located at: May 5 05:05:09 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63 May 5 05:05:09 kernel: Available 7 bytes at (off,len): May 5 05:05:09 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) May 5 05:05:09 kernel: Scanning device for bad blocks May 5 05:05:09 kernel: Options: NO_AUTOINCR,NO_READRDY, May 5 05:05:09 kernel: Creating 2 MTD partitions on "brcmnand": May 5 05:05:09 kernel: 0x000004000000-0x000007ec0000 : "brcmnand" May 5 05:05:09 kernel: 0x000007ec0000-0x000008000000 : "asus" May 5 05:05:09 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3. May 5 05:05:09 kernel: devtmpfs: mounted May 5 05:05:09 kernel: Freeing init memory: 212K May 5 05:05:09 kernel: ctf: module license 'Proprietary' taints kernel. May 5 05:05:09 kernel: Disabling lock debugging due to kernel taint May 5 05:05:09 kernel: et_module_init: passivemode set to 0x0 May 5 05:05:09 kernel: et_module_init: txworkq set to 0x1 May 5 05:05:09 kernel: et_module_init: et_txq_thresh set to 0xce4 May 5 05:05:09 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: et_probe: mvlan vid[0]: 0 May 5 05:05:09 kernel: et_probe: mvlan vid[1]: 0 May 5 05:05:09 kernel: et_probe: mvlan en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 8 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: dpsta_init: Jun 12 2019 23:31:45 msglevel 0x1 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 4 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: wl_module_init: passivemode set to 0x0 May 5 05:05:09 kernel: wl_module_init: igs set to 0x0 May 5 05:05:09 kernel: wl_module_init: txworkq set to 0x1 May 5 05:05:09 kernel: wl0: wlc_ap_attach dynamic_ed_thresh_enable = 0 May 5 05:05:09 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: wl1: wlc_ap_attach dynamic_ed_thresh_enable = 0 May 5 05:05:09 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc. May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: tp_init uses obsolete (PF_INET,SOCK_PACKET) May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: device vlan1 entered promiscuous mode May 5 05:05:09 kernel: device eth0 entered promiscuous mode May 5 05:05:10 kernel: device eth1 entered promiscuous mode May 5 05:05:10 kernel: device eth2 entered promiscuous mode May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:10 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:10 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 1(vlan1) entering forwarding state May 5 05:05:10 kernel: br0: port 1(vlan1) entering forwarding state May 5 05:05:10 nat: apply redirect rules May 5 05:05:11 syslog: wlceventd Start... May 5 05:05:12 dnsmasq[227]: started, version 2.81-32-g93cb543 cachesize 1500 May 5 05:05:12 dnsmasq[227]: asynchronous logging enabled, queue limit is 5 messages May 5 05:05:12 dnsmasq-dhcp[227]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d May 5 05:05:12 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:05:12 DSL-AC68U: start httpd:80 May 5 05:05:13 avahi-daemon[279]: Found user 'nobody' (UID 65534) and group 'nobody' (GID 65534). May 5 05:05:13 avahi-daemon[279]: Successfully dropped root privileges. May 5 05:05:13 avahi-daemon[279]: avahi-daemon 0.7 starting up. May 5 05:05:13 jffs2: valid logs(1) May 5 05:05:13 disk_monitor: be idle May 5 05:05:13 hour_monitor: daemon is starting May 5 05:05:13 hour_monitor: daemon terminates May 5 05:05:13 kernel: device eth1 left promiscuous mode May 5 05:05:13 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:13 avahi-daemon[279]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! May 5 05:05:13 avahi-daemon[279]: No service file found in /tmp/avahi/services. May 5 05:05:13 avahi-daemon[279]: Loading new alias name DSL-AC68U. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.1.1. May 5 05:05:13 avahi-daemon[279]: New relevant interface br0.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface vlan2.IPv4 with address 169.254.70.103. May 5 05:05:13 avahi-daemon[279]: New relevant interface vlan2.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1. May 5 05:05:13 avahi-daemon[279]: New relevant interface lo.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Network interface enumeration completed. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 192.168.1.1 on br0.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 169.254.70.103 on vlan2.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 127.0.1.1 on lo.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 127.0.0.1 on lo.IPv4. May 5 05:05:13 kernel: device eth2 left promiscuous mode May 5 05:05:13 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 httpd: Generating SSL certificate... May 5 05:05:14 kernel: device eth1 entered promiscuous mode May 5 05:05:14 kernel: br0: topology change detected, propagating May 5 05:05:14 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:14 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:14 avahi-daemon[279]: Server startup complete. Host name is DSL-AC68U-F2E8.local. Local service cookie is 2795110832. May 5 05:05:14 avahi-daemon[279]: Alias name "DSL-AC68U" successfully established. May 5 05:05:14 kernel: device eth2 entered promiscuous mode May 5 05:05:14 kernel: br0: topology change detected, propagating May 5 05:05:14 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 syslog: wlceventd Start... May 5 05:05:15 WAN_Connection: ISP's DHCP did not function properly. May 5 05:05:16 WAN_Connection: Ethernet link down. May 5 05:05:16 dnsmasq-dhcp[227]: DHCPREQUEST(br0) 192.168.200.191 d0:81:7a:d5:5e:e0 May 5 05:05:16 dnsmasq-dhcp[227]: DHCPNAK(br0) 192.168.200.191 d0:81:7a:d5:5e:e0 wrong network May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected DFS-exit channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: acs_set_chspec: 0x1001 (1) for reason APCS_INIT May 5 05:05:20 dnsmasq-dhcp[227]: DHCPDISCOVER(br0) d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPOFFER(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPDISCOVER(br0) d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPOFFER(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:21 dnsmasq-dhcp[227]: DHCPREQUEST(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:21 dnsmasq-dhcp[227]: DHCPACK(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 Geoffroys-iPro May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected DFS-exit channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: acs_set_chspec: 0xe03a (52/80) for reason APCS_INIT May 5 05:05:22 kernel: usbcore: registered new interface driver usbfs May 5 05:05:22 kernel: usbcore: registered new interface driver hub May 5 05:05:22 kernel: usbcore: registered new device driver usb May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_acm May 5 05:05:22 kernel: cdc_acm: v0.26:USB Abstract Control Model driver for USB modems and ISDN adapters May 5 05:05:22 kernel: usbcore: registered new interface driver asix May 5 05:05:22 syslog: module ax88179_178a not found in modules.dep May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_ether May 5 05:05:22 Mastiff: init May 5 05:05:22 kernel: usbcore: registered new interface driver rndis_host May 5 05:05:22 kernel: cdc_ncm: 14-Mar-2012 May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_ncm May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_wdm May 5 05:05:22 kernel: usbcore: registered new interface driver qmi_wwan May 5 05:05:22 kernel: cdc_mbim: loaded May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_mbim May 5 05:05:22 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: xHCI Host Controller May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: new USB bus registered, assigned bus number 1 May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: irq 112, io mem 0x18023000 May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry May 5 05:05:24 kernel: usb usb1: No SuperSpeed endpoint companion for config 1 interface 0 altsetting 0 ep 129: using minimum values May 5 05:05:24 kernel: hub 1-0:1.0: USB hub found May 5 05:05:24 kernel: hub 1-0:1.0: 1 port detected May 5 05:05:24 kernel: [xhci-hub] usb2mode:[0] May 5 05:05:24 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: EHCI Host Controller May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: new USB bus registered, assigned bus number 2 May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: irq 111, io mem 0x18021000 May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: USB 0.0 started, EHCI 1.00 May 5 05:05:24 kernel: hub 2-0:1.0: USB hub found May 5 05:05:24 kernel: hub 2-0:1.0: 2 ports detected May 5 05:05:24 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: OHCI Host Controller May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: new USB bus registered, assigned bus number 3 May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: irq 111, io mem 0x18022000 May 5 05:05:24 kernel: hub 3-0:1.0: USB hub found May 5 05:05:24 kernel: hub 3-0:1.0: 2 ports detected May 5 05:05:24 kernel: SCSI subsystem initialized May 5 05:05:24 kernel: csw_retry 100 May 5 05:05:24 kernel: Initializing USB Mass Storage driver... May 5 05:05:24 kernel: usbcore: registered new interface driver usb-storage May 5 05:05:24 kernel: USB Mass Storage support registered. May 5 05:05:25 kernel: Tuxera FAT 12/16/32 driver version 3015.1.29.5_1 [Flags: R/W MODULE]. May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: Tuxera NTFS driver 3018.6.5.3 [Flags: R/W MODULE]. May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: Tuxera HFS+ driver 3017.6.20 May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: usbcore: registered new interface driver usblp May 5 05:05:49 rc_service: httpd 241:notify_rc start_dsl_autodet May 5 05:05:51 rc_service: httpd 241:notify_rc start_dsl_autodet May 5 05:06:23 DSL: Link down -> up May 5 05:06:26 WAN_Connection: Ethernet link up. May 5 05:06:26 rc_service: wanduck 189:notify_rc restart_wan_if 0 May 5 05:06:27 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:06:30 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:06:31 WAN_Connection: ISP's DHCP did not function properly. May 5 05:06:42 rc_service: httpd 241:notify_rc restart_dsl_setting; May 5 05:06:53 DSL: Link up -> down May 5 05:07:05 WAN_Connection: Ethernet link down. May 5 05:07:16 rc_service: httpd 241:notify_rc chpass May 5 05:07:16 rc_service: httpd 241:notify_rc restart_ftpsamba May 5 05:07:16 rc_service: waitting "chpass" via httpd ... May 5 05:07:17 lldpd[965]: could not open either /etc/os-release or /usr/lib/os-release May 5 05:07:17 lldpd[965]: lsb_release information not available May 5 05:07:17 lldpd[969]: created chroot directory /var/run/lldpd May 5 05:07:17 lldpd[969]: protocol LLDP enabled May 5 05:07:17 lldpd[969]: protocol CDPv1 disabled May 5 05:07:17 lldpd[969]: protocol CDPv2 disabled May 5 05:07:17 lldpd[969]: protocol SONMP disabled May 5 05:07:17 lldpd[969]: protocol EDP disabled May 5 05:07:17 lldpd[969]: protocol FDP disabled May 5 05:07:17 lldpd[969]: libevent 2.0.21-stable initialized with epoll method May 5 05:07:18 lldpd[969]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted May 5 05:07:18 lldpd[969]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted May 5 05:07:18 lldpcli[967]: lldpd should resume operations May 5 05:07:20 FTP_Server: daemon is stopped May 5 05:07:20 Samba_Server: smb daemon is stopped May 5 05:07:20 dnsmasq[227]: exiting on receipt of SIGTERM May 5 05:07:20 kernel: gro disabled May 5 05:07:20 dnsmasq[987]: started, version 2.81-32-g93cb543 cachesize 1500 May 5 05:07:20 dnsmasq[987]: asynchronous logging enabled, queue limit is 5 messages May 5 05:07:20 dnsmasq-dhcp[987]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d May 5 05:07:20 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:24 rc_service: httpd 241:notify_rc restart_dsl_wireless 0; May 5 05:07:26 kernel: device eth1 left promiscuous mode May 5 05:07:26 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:26 kernel: device eth2 left promiscuous mode May 5 05:07:26 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:28 kernel: device eth1 entered promiscuous mode May 5 05:07:28 kernel: br0: topology change detected, propagating May 5 05:07:28 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:28 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:28 kernel: device eth2 entered promiscuous mode May 5 05:07:28 kernel: br0: topology change detected, propagating May 5 05:07:28 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:28 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:29 syslog: wlceventd Start... May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected DFS-exit channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: acs_set_chspec: 0x1001 (1) for reason APCS_INIT May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected DFS-exit channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: acs_set_chspec: 0xe03a (52/80) for reason APCS_INIT May 5 05:07:36 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:43 rc_service: watchdog 247:notify_rc start_cfgsync May 5 05:07:43 rc_service: waitting "restart_dsl_wireless 0;" via httpd ... May 5 05:07:45 pppd[1083]: Plugin rp-pppoe.so loaded. May 5 05:07:45 pppd[1083]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.7 May 5 05:07:45 pppd[1086]: pppd 2.4.7 started by admin, uid 0 May 5 05:07:58 kernel: nf_conntrack_rtsp v0.6.21 loading May 5 05:07:58 kernel: nf_nat_rtsp v0.6.21 loading May 5 05:07:58 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:58 zcip_client: configured 169.254.104.180 May 5 05:08:21 pppd[1086]: Timeout waiting for PADO packets May 5 05:08:43 DSL: Link down -> up May 5 05:08:45 WAN_Connection: Ethernet link up. May 5 05:08:45 rc_service: wanduck 189:notify_rc restart_wan_if 0 May 5 05:08:45 pppd[1086]: Unable to complete PPPoE Discovery May 5 05:08:46 pppd[1086]: Hangup (SIGHUP) May 5 05:08:46 pppd[1086]: Terminating on signal 15 May 5 05:08:46 pppd[1086]: Exit. May 5 05:08:46 lldpd[969]: removal request for address of 169.254.104.180%6, but no knowledge of it May 5 05:08:46 pppd[1285]: Plugin rp-pppoe.so loaded. May 5 05:08:46 pppd[1285]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.7 May 5 05:08:47 pppd[1287]: pppd 2.4.7 started by admin, uid 0 May 5 05:08:47 pppd[1287]: PPP session is 1 (0x1) May 5 05:08:47 pppd[1287]: Connected to 00:02:3b:10:44:12 via interface vlan3880 May 5 05:08:47 pppd[1287]: Using interface ppp0 May 5 05:08:47 pppd[1287]: Connect: ppp0 <--> vlan3880 May 5 05:08:50 pppd[1287]: PAP authentication succeeded May 5 05:08:50 pppd[1287]: peer from calling number 00:02:3B:10:44:12 authorized May 5 05:08:50 WAN_Connection: Fail to connect with some issues. May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:51 pppd[1287]: local IP address 78.180.161.21 May 5 05:08:51 pppd[1287]: remote IP address 78.180.160.1 May 5 05:08:51 pppd[1287]: primary DNS address 195.175.39.49 May 5 05:08:51 pppd[1287]: secondary DNS address 195.175.39.50 May 5 05:08:51 lldpd[969]: removal request for address of 78.180.160.1%12, but no knowledge of it May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:52 nat: apply nat rules (/tmp/nat_rules_ppp0_vlan3880) May 5 05:08:52 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:08:52 dnsmasq[987]: using nameserver 195.175.39.50#53 May 5 05:08:52 dnsmasq[987]: using nameserver 195.175.39.49#53 May 5 05:08:53 wan: finish adding multi routes May 5 05:08:53 rc_service: ip-up 1300:notify_rc stop_ntpd May 5 05:08:53 rc_service: ip-up 1300:notify_rc start_ntpd May 5 05:08:53 rc_service: waitting "stop_ntpd" via ip-up ... May 5 05:08:54 ntpd: Started ntpd May 5 05:08:54 miniupnpd[1348]: HTTP listening on port 35152 May 5 05:08:54 miniupnpd[1348]: Listening for NAT-PMP/PCP traffic on port 5351 May 5 05:08:56 WAN_Connection: WAN was restored. Mar 8 21:33:06 ntpd: Initial clock set Mar 8 21:33:06 rc_service: ntpd_synced 1374:notify_rc restart_diskmon Mar 8 21:33:06 disk_monitor: Finish Mar 8 21:33:07 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:33:07 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:33:07 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:33:07 rc_service: httpd 241:notify_rc start_webs_update Mar 8 21:33:08 disk_monitor: be idle Mar 8 21:33:10 crond[236]: time disparity of 1495705 minutes detected Mar 8 21:33:10 nat: apply nat rules (/tmp/nat_rules_ppp0_vlan3880) Mar 8 21:33:10 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:33:10 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:33:10 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:33:10 zcip_client: configured 169.254.104.180 Mar 8 21:33:58 openvpn: Resetting client (unit 1) to default settings Mar 8 21:34:31 rc_service: httpd 241:notify_rc start_vpnrouting1 Mar 8 21:34:41 rc_service: httpd 241:notify_rc start_vpnclient1 Mar 8 21:34:41 kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 8 21:34:41 kernel: tun: (C) 1999-2004 Max Krasnyansky < maxk@qualcomm.com> Mar 8 21:34:43 ovpn-client1[1822]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 2 2020 Mar 8 21:34:43 ovpn-client1[1822]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.08 Mar 8 21:34:43 ovpn-client1[1823]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:34:43 ovpn-client1[1823]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:34:43 ovpn-client1[1823]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:34:43 ovpn-client1[1823]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:34:43 ovpn-client1[1823]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:34:44 ovpn-client1[1823]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:34:44 ovpn-client1[1823]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:34:44 ovpn-client1[1823]: UDP link local: (not bound) Mar 8 21:34:44 ovpn-client1[1823]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:34:44 ovpn-client1[1823]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=ed923a13 c6b24903 Mar 8 21:34:44 ovpn-client1[1823]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:34:44 ovpn-client1[1823]: VERIFY KU OK Mar 8 21:34:44 ovpn-client1[1823]: Validating certificate extended key usage Mar 8 21:34:44 ovpn-client1[1823]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:34:44 ovpn-client1[1823]: VERIFY EKU OK Mar 8 21:34:44 ovpn-client1[1823]: VERIFY X509NAME OK: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Mar 8 21:34:44 ovpn-client1[1823]: VERIFY OK: depth=0, CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Mar 8 21:34:44 ovpn-client1[1823]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 256 bit EC, curve: prime256v1 Mar 8 21:34:44 ovpn-client1[1823]: raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Peer Connection Initiated with [AF_INET]86.194.123.126:12346 Mar 8 21:34:45 ovpn-client1[1823]: SENT CONTROL
(status=1) Mar 8 21:34:45 ovpn-client1[1823]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.10 255.255.255.0,peer-id 8,cipher AES-256-GCM' Mar 8 21:34:45 ovpn-client1[1823]: Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:3: block-outside-dns (2.4.9) Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: timers and/or timeouts modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: --ifconfig/up options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: route options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: route-related options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: peer-id set Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: adjusting link_mtu to 1624 Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: data channel crypto options modified Mar 8 21:34:45 ovpn-client1[1823]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 8 21:34:45 ovpn-client1[1823]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 8 21:34:45 ovpn-client1[1823]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 8 21:34:45 ovpn-client1[1823]: TUN/TAP device tun11 opened Mar 8 21:34:45 ovpn-client1[1823]: TUN/TAP TX queue length set to 1000 Mar 8 21:34:45 ovpn-client1[1823]: /sbin/ifconfig tun11 10.8.0.10 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255 Mar 8 21:34:45 lldpd[969]: removal request for address of 10.8.0.10%13, but no knowledge of it Mar 8 21:34:45 lldpd[969]: removal request for address of 10.8.0.10%13, but no knowledge of it Mar 8 21:34:45 ovpn-client1[1823]: updown.sh tun11 1500 1552 10.8.0.10 255.255.255.0 init Mar 8 21:34:46 rc_service: service 1902:notify_rc updateresolv Mar 8 21:34:46 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:34:46 dnsmasq[987]: using nameserver 8.8.4.4#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 8.8.8.8#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 86.194.123.126 netmask 255.255.255.255 gw 78.180.160.1 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1 Mar 8 21:34:49 openvpn-routing: Configuring policy rules for client 1 Mar 8 21:34:49 ovpn-client1[1823]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 8 21:34:49 ovpn-client1[1823]: Initialization Sequence Completed
Mar 8 21:44:00 rc_service: httpd 316:notify_rc stop_vpnclient1 Mar 8 21:44:00 ovpn-client1[1980]: SIGTERM[hard,init_instance] received, process exiting Mar 8 21:44:40 rc_service: httpd 316:notify_rc start_vpnclient1 Mar 8 21:44:42 ovpn-client1[2443]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Mar 8 21:44:42 ovpn-client1[2443]: OpenVPN 2.5.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 8 2021 Mar 8 21:44:42 ovpn-client1[2443]: library versions: OpenSSL 1.1.1i 8 Dec 2020, LZO 2.08 Mar 8 21:44:42 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:43 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:43 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:43 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=75260ccd 3071b640 Mar 8 21:44:43 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:43 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:43 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:43 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:43 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:43 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:43 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:43 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:43 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:43 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:48 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:48 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:48 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:48 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:49 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=fdeba33e f8428c9a Mar 8 21:44:49 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:49 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:49 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:49 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:49 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:49 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:49 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:49 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:49 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:49 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:54 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:54 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:54 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=9eee7f8c 45f50c10 Mar 8 21:44:54 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:54 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:54 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:54 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:54 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:54 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:54 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:54 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:54 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:54 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:59 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:59 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:59 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=b7be62db 7f2a0545
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/gnuton/asuswrt-merlin.ng/issues/88#issuecomment-793103879, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAEMYRBDM5BXLOWD6MDDL4TTCVAXVANCNFSM4Y2B37NQ .
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or unsubscribe.
I solved the problem by removing the Verify Server Certificate Name
Kind regards
Geoffroy Guichard - Chat @ Spike [xoxix]
On March 9, 2021 at 7:44 GMT, Geoffroy Guichard geoffroy@yahoo.com wrote:
The certificate is less than 1 year old, I understand for openvpn they are valid 10 years. The certificate works on the 384 ... I did factory reset the 68U, erased the JFF, and reload the ovpn file. Still the exact same issue. I saw on snbforum a similar case with some using the merlin firmware, and like me trying to connect openvpn to a raspberry PI. Maybe the problem is on merlin? Best Geoffroy
Geoffroy Guichard - Chat @ Spike [xo9vi]
On March 9, 2021 at 7:26 GMT, Antonio Aloisio notifications@github.com wrote:
Hi, the following lines: Mar 8 21:44:43 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:43 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS handshake failed
from the lines it looks like there is something not right in the certificate. Is it old or somehow corrupted?
maybe
openssl verify -CAfile
could help to check that
On Mon, Mar 8, 2021 at 10:47 PM geoffroyguich notifications@github.com wrote:
Here are 2 log files.
One of the 384 firmware with a successful connection and one with the 386.
Thank you
Kind regards Geoffroy
Geoffroy Guichard - Chat @ Spike [xni7n]
On March 8, 2021 at 20:40 GMT, Antonio Aloisio notifications@github.com wrote:
can you please share the logs?
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or unsubscribe. May 5 05:05:09 syslogd started: BusyBox v1.25.1 May 5 05:05:09 kernel: klogd started: BusyBox v1.25.1 (2020-05-02 02:41:58 EDT) May 5 05:05:09 kernel: Linux version 2.6.36.4brcmarm (root@a2c8f8f439b9) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 May 5 05:05:09 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f May 5 05:05:09 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache May 5 05:05:09 kernel: Machine: Northstar Prototype May 5 05:05:09 kernel: Ignoring unrecognised tag 0x00000000 May 5 05:05:09 kernel: bootconsole [earlycon0] enabled May 5 05:05:09 kernel: Memory policy: ECC disabled, Data cache writealloc May 5 05:05:09 kernel: MPCORE found at 19020000 May 5 05:05:09 kernel: PERCPU: Embedded 7 pages/cpu @c8215000 s5472 r8192 d15008 u65536 May 5 05:05:09 kernel: pcpu-alloc: s5472 r8192 d15008 u65536 alloc=16*4096 May 5 05:05:09 kernel: pcpu-alloc: [0] 0 [0] 1 May 5 05:05:09 kernel: Built 1 zonelists in Zone order, mobility grouping on. Total pages: 60416 May 5 05:05:09 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug May 5 05:05:09 kernel: PID hash table entries: 1024 (order: 0, 4096 bytes) May 5 05:05:09 kernel: Dentry cache hash table entries: 32768 (order: 5, 131072 bytes) May 5 05:05:09 kernel: Inode-cache hash table entries: 16384 (order: 4, 65536 bytes) May 5 05:05:09 kernel: Memory: 128MB 128MB = 256MB total May 5 05:05:09 kernel: Memory: 255464k/255464k available, 6680k reserved, 0K highmem May 5 05:05:09 kernel: Virtual kernel memory layout: May 5 05:05:09 kernel: vector : 0xffff0000 - 0xffff1000 ( 4 kB) May 5 05:05:09 kernel: fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB) May 5 05:05:09 kernel: DMA : 0xf7e00000 - 0xffe00000 ( 128 MB) May 5 05:05:09 kernel: vmalloc : 0xd0800000 - 0xf0000000 ( 504 MB) May 5 05:05:09 kernel: lowmem : 0xc0000000 - 0xd0000000 ( 256 MB) May 5 05:05:09 kernel: modules : 0xbf000000 - 0xc0000000 ( 16 MB) May 5 05:05:09 kernel: .init : 0xc0008000 - 0xc003d000 ( 212 kB) May 5 05:05:09 kernel: .text : 0xc003d000 - 0xc03af000 (3528 kB) May 5 05:05:09 kernel: .data : 0xc03c8000 - 0xc03eb2e0 ( 141 kB) May 5 05:05:09 kernel: SLUB: Genslabs=11, HWalign=32, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 5 05:05:09 kernel: Hierarchical RCU implementation. May 5 05:05:09 kernel: RCU-based detection of stalled CPUs is disabled. May 5 05:05:09 kernel: Verbose stalled-CPUs detection is disabled. May 5 05:05:09 kernel: NR_IRQS:256 May 5 05:05:09 kernel: MPCORE GIC init May 5 05:05:09 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored. May 5 05:05:09 kernel: MPCORE Global Timer Clock 400000000Hz May 5 05:05:09 kernel: Calibrating delay loop... 1595.80 BogoMIPS (lpj=7979008) May 5 05:05:09 kernel: pid_max: default: 32768 minimum: 301 May 5 05:05:09 kernel: Mount-cache hash table entries: 512 May 5 05:05:09 kernel: CPU: Testing write buffer coherency: ok May 5 05:05:09 kernel: MPCORE Private timer setup CPU0 May 5 05:05:09 kernel: Calibrating local timer... 399.853MHz. May 5 05:05:09 kernel: L310: cache controller enabled 16 ways, CACHE_ID 0x410000c8, AUX_CTRL 0x7a130000 May 5 05:05:09 kernel: CPU1: Booted secondary processor May 5 05:05:09 kernel: MPCORE Private timer setup CPU1 May 5 05:05:09 kernel: Brought up 2 CPUs May 5 05:05:09 kernel: SMP: Total of 2 processors activated (3191.60 BogoMIPS). May 5 05:05:09 kernel: devtmpfs: initialized May 5 05:05:09 kernel: atomic64 test passed May 5 05:05:09 kernel: NET: Registered protocol family 16 May 5 05:05:09 kernel: Found a Unknown NAND flash: May 5 05:05:09 kernel: Total size: 128MB May 5 05:05:09 kernel: Block size: 128KB May 5 05:05:09 kernel: Page Size: 2048B May 5 05:05:09 kernel: OOB Size: 64B May 5 05:05:09 kernel: Sector size: 512B May 5 05:05:09 kernel: Spare size: 16B May 5 05:05:09 kernel: ECC level: 8 (8-bit) May 5 05:05:09 kernel: Device ID: 0xef 0xf1 0x 0 0x95 0x 0 0x00 May 5 05:05:09 kernel: CCA UART Clock Config: Sel=1 Ovr=1 Div=48 May 5 05:05:09 kernel: CCA UART Clock rate 100000000Hz May 5 05:05:09 kernel: bio: create slab
at 0 May 5 05:05:09 kernel: Switching to clocksource mpcore_gtimer May 5 05:05:09 kernel: NET: Registered protocol family 2 May 5 05:05:09 kernel: IP route cache hash table entries: 2048 (order: 1, 8192 bytes) May 5 05:05:09 kernel: TCP established hash table entries: 8192 (order: 4, 65536 bytes) May 5 05:05:09 kernel: TCP bind hash table entries: 8192 (order: 4, 98304 bytes) May 5 05:05:09 kernel: TCP: Hash tables configured (established 8192 bind 8192) May 5 05:05:09 kernel: TCP reno registered May 5 05:05:09 kernel: UDP hash table entries: 128 (order: 0, 4096 bytes) May 5 05:05:09 kernel: UDP-Lite hash table entries: 128 (order: 0, 4096 bytes) May 5 05:05:09 kernel: NET: Registered protocol family 1 May 5 05:05:09 kernel: PCI: no core May 5 05:05:09 kernel: PCI: no core May 5 05:05:09 kernel: PCI: scanning bus 0 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCIE1 link=1 May 5 05:05:09 kernel: PCIE1 switching to GEN2 May 5 05:05:09 kernel: PCIE1 link=1 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCI: bus0: Fast back to back transfers disabled May 5 05:05:09 kernel: PCI: Fixing up bus 1 May 5 05:05:09 kernel: PCI: bus1: Fast back to back transfers disabled May 5 05:05:09 kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff] May 5 05:05:09 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit] May 5 05:05:09 kernel: pci 0001:01:00.0: BAR 0: set to [mem 0x08000000-0x08007fff 64bit] (PCI address [0x8000000-0x8007fff] May 5 05:05:09 kernel: pci 0001:00:00.0: PCI bridge to [bus 01-01] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [io disabled] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff] May 5 05:05:09 kernel: pci 0001:00:00.0: bridge window [mem pref disabled] May 5 05:05:09 kernel: PCIE2 link=1 May 5 05:05:09 kernel: PCIE2 switching to GEN2 May 5 05:05:09 kernel: PCIE2 link=1 May 5 05:05:09 kernel: PCI: Fixing up bus 0 May 5 05:05:09 kernel: PCI: bus0: Fast back to back transfers disabled May 5 05:05:09 kernel: PCI: Fixing up bus 2 May 5 05:05:09 kernel: PCI: bus2: Fast back to back transfers disabled May 5 05:05:09 kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff] May 5 05:05:09 kernel: pci 0002:02:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit] May 5 05:05:09 kernel: pci 0002:02:00.0: BAR 0: set to [mem 0x40000000-0x40007fff 64bit] (PCI address [0x40000000-0x40007fff] May 5 05:05:09 kernel: pci 0002:00:00.0: PCI bridge to [bus 02-02] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [io disabled] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff] May 5 05:05:09 kernel: pci 0002:00:00.0: bridge window [mem pref disabled] May 5 05:05:09 kernel: PCIE3 link=0 May 5 05:05:09 kernel: VFS: Disk quotas dquot_6.5.2 May 5 05:05:09 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes) May 5 05:05:09 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 5 05:05:09 kernel: fuse init (API version 7.15) May 5 05:05:09 kernel: msgmni has been set to 498 May 5 05:05:09 kernel: io scheduler noop registered (default) May 5 05:05:09 kernel: io scheduler deadline registered May 5 05:05:09 kernel: io scheduler cfq registered May 5 05:05:09 kernel: Serial: 8250/16550 driver, 2 ports, IRQ sharing disabled May 5 05:05:09 kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117) is a 16550 May 5 05:05:09 kernel: console [ttyS0] enabled, bootconsole disabled May 5 05:05:09 kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117) is a 16550 May 5 05:05:09 kernel: brd: module loaded May 5 05:05:09 kernel: loop: module loaded May 5 05:05:09 kernel: pflash: found no supported devices May 5 05:05:09 kernel: bcmsflash: found no supported devices May 5 05:05:09 kernel: Boot partition size = 524288(0x80000) May 5 05:05:09 kernel: lookup_nflash_rootfs_offset: offset = 0x200000 May 5 05:05:09 kernel: nflash: squash filesystem with lzma found at block 28 May 5 05:05:09 kernel: Creating 4 MTD partitions on "nflash": May 5 05:05:09 kernel: 0x000000000000-0x000000080000 : "boot" May 5 05:05:09 kernel: 0x000000080000-0x000000200000 : "nvram" May 5 05:05:09 kernel: 0x000000200000-0x000004000000 : "linux" May 5 05:05:09 kernel: 0x00000039fbf4-0x000004000000 : "rootfs" May 5 05:05:09 kernel: PPP generic driver version 2.4.2 May 5 05:05:09 kernel: PPP MPPE Compression module registered May 5 05:05:09 kernel: NET: Registered protocol family 24 May 5 05:05:09 kernel: PPTP driver version 0.8.5 May 5 05:05:09 kernel: Mirror/redirect action on May 5 05:05:09 kernel: u32 classifier May 5 05:05:09 kernel: Performance counters on May 5 05:05:09 kernel: Actions configured May 5 05:05:09 kernel: Netfilter messages via NETLINK v0.30. May 5 05:05:09 kernel: nf_conntrack version 0.5.0 (3991 buckets, 15964 max) May 5 05:05:09 kernel: ctnetlink v0.93: registering with nfnetlink. May 5 05:05:09 kernel: xt_time: kernel timezone is -0000 May 5 05:05:09 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team May 5 05:05:09 kernel: TCP cubic registered May 5 05:05:09 kernel: NET: Registered protocol family 10 May 5 05:05:09 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team May 5 05:05:09 kernel: NET: Registered protocol family 17 May 5 05:05:09 kernel: L2TP core driver, V2.0 May 5 05:05:09 kernel: PPPoL2TP kernel driver, V2.0 May 5 05:05:09 kernel: 802.1Q VLAN Support v1.8 Ben Greear < greearb@candelatech.com> May 5 05:05:09 kernel: All bugs added by David S. Miller <davem@redhat.com May 5 05:05:09 kernel: Registering the dns_resolver key type May 5 05:05:09 kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012 May 5 05:05:09 kernel: NAND device: Manufacturer ID: 0xef, Chip ID: 0xf1 (Unknown NAND 128MiB 3,3V 8-bit) May 5 05:05:09 kernel: Spare area=64 eccbytes 56, ecc bytes located at: May 5 05:05:09 kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63 May 5 05:05:09 kernel: Available 7 bytes at (off,len): May 5 05:05:09 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) May 5 05:05:09 kernel: Scanning device for bad blocks May 5 05:05:09 kernel: Options: NO_AUTOINCR,NO_READRDY, May 5 05:05:09 kernel: Creating 2 MTD partitions on "brcmnand": May 5 05:05:09 kernel: 0x000004000000-0x000007ec0000 : "brcmnand" May 5 05:05:09 kernel: 0x000007ec0000-0x000008000000 : "asus" May 5 05:05:09 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3. May 5 05:05:09 kernel: devtmpfs: mounted May 5 05:05:09 kernel: Freeing init memory: 212K May 5 05:05:09 kernel: ctf: module license 'Proprietary' taints kernel. May 5 05:05:09 kernel: Disabling lock debugging due to kernel taint May 5 05:05:09 kernel: et_module_init: passivemode set to 0x0 May 5 05:05:09 kernel: et_module_init: txworkq set to 0x1 May 5 05:05:09 kernel: et_module_init: et_txq_thresh set to 0xce4 May 5 05:05:09 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: et_probe: mvlan vid[0]: 0 May 5 05:05:09 kernel: et_probe: mvlan vid[1]: 0 May 5 05:05:09 kernel: et_probe: mvlan en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan2 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 8 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: dpsta_init: Jun 12 2019 23:31:45 msglevel 0x1 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 4 for vlan3880 mvlan_en 0 May 5 05:05:09 kernel: wl_module_init: passivemode set to 0x0 May 5 05:05:09 kernel: wl_module_init: igs set to 0x0 May 5 05:05:09 kernel: wl_module_init: txworkq set to 0x1 May 5 05:05:09 kernel: wl0: wlc_ap_attach dynamic_ed_thresh_enable = 0 May 5 05:05:09 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: wl1: wlc_ap_attach dynamic_ed_thresh_enable = 0 May 5 05:05:09 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982) May 5 05:05:09 kernel: JFFS2 version 2.2. (NAND) © 2001-2006 Red Hat, Inc. May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 16 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 5 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: tp_init uses obsolete (PF_INET,SOCK_PACKET) May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0 May 5 05:05:09 kernel: device vlan1 entered promiscuous mode May 5 05:05:09 kernel: device eth0 entered promiscuous mode May 5 05:05:10 kernel: device eth1 entered promiscuous mode May 5 05:05:10 kernel: device eth2 entered promiscuous mode May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:10 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:10 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:10 kernel: br0: topology change detected, propagating May 5 05:05:10 kernel: br0: port 1(vlan1) entering forwarding state May 5 05:05:10 kernel: br0: port 1(vlan1) entering forwarding state May 5 05:05:10 nat: apply redirect rules May 5 05:05:11 syslog: wlceventd Start... May 5 05:05:12 dnsmasq[227]: started, version 2.81-32-g93cb543 cachesize 1500 May 5 05:05:12 dnsmasq[227]: asynchronous logging enabled, queue limit is 5 messages May 5 05:05:12 dnsmasq-dhcp[227]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d May 5 05:05:12 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:05:12 DSL-AC68U: start httpd:80 May 5 05:05:13 avahi-daemon[279]: Found user 'nobody' (UID 65534) and group 'nobody' (GID 65534). May 5 05:05:13 avahi-daemon[279]: Successfully dropped root privileges. May 5 05:05:13 avahi-daemon[279]: avahi-daemon 0.7 starting up. May 5 05:05:13 jffs2: valid logs(1) May 5 05:05:13 disk_monitor: be idle May 5 05:05:13 hour_monitor: daemon is starting May 5 05:05:13 hour_monitor: daemon terminates May 5 05:05:13 kernel: device eth1 left promiscuous mode May 5 05:05:13 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:13 avahi-daemon[279]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns! May 5 05:05:13 avahi-daemon[279]: No service file found in /tmp/avahi/services. May 5 05:05:13 avahi-daemon[279]: Loading new alias name DSL-AC68U. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.1.1. May 5 05:05:13 avahi-daemon[279]: New relevant interface br0.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface vlan2.IPv4 with address 169.254.70.103. May 5 05:05:13 avahi-daemon[279]: New relevant interface vlan2.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Joining mDNS multicast group on interface lo.IPv4 with address 127.0.1.1. May 5 05:05:13 avahi-daemon[279]: New relevant interface lo.IPv4 for mDNS. May 5 05:05:13 avahi-daemon[279]: Network interface enumeration completed. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 192.168.1.1 on br0.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 169.254.70.103 on vlan2.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 127.0.1.1 on lo.IPv4. May 5 05:05:13 avahi-daemon[279]: Registering new address record for 127.0.0.1 on lo.IPv4. May 5 05:05:13 kernel: device eth2 left promiscuous mode May 5 05:05:13 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 httpd: Generating SSL certificate... May 5 05:05:14 kernel: device eth1 entered promiscuous mode May 5 05:05:14 kernel: br0: topology change detected, propagating May 5 05:05:14 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:14 kernel: br0: port 2(eth1) entering forwarding state May 5 05:05:14 avahi-daemon[279]: Server startup complete. Host name is DSL-AC68U-F2E8.local. Local service cookie is 2795110832. May 5 05:05:14 avahi-daemon[279]: Alias name "DSL-AC68U" successfully established. May 5 05:05:14 kernel: device eth2 entered promiscuous mode May 5 05:05:14 kernel: br0: topology change detected, propagating May 5 05:05:14 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 kernel: br0: port 3(eth2) entering forwarding state May 5 05:05:14 syslog: wlceventd Start... May 5 05:05:15 WAN_Connection: ISP's DHCP did not function properly. May 5 05:05:16 WAN_Connection: Ethernet link down. May 5 05:05:16 dnsmasq-dhcp[227]: DHCPREQUEST(br0) 192.168.200.191 d0:81:7a:d5:5e:e0 May 5 05:05:16 dnsmasq-dhcp[227]: DHCPNAK(br0) 192.168.200.191 d0:81:7a:d5:5e:e0 wrong network May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected DFS-exit channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:05:18 acsd: selected channel spec: 0x1001 (1) May 5 05:05:18 acsd: acs_set_chspec: 0x1001 (1) for reason APCS_INIT May 5 05:05:20 dnsmasq-dhcp[227]: DHCPDISCOVER(br0) d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPOFFER(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPDISCOVER(br0) d0:81:7a:d5:5e:e0 May 5 05:05:20 dnsmasq-dhcp[227]: DHCPOFFER(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:21 dnsmasq-dhcp[227]: DHCPREQUEST(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 May 5 05:05:21 dnsmasq-dhcp[227]: DHCPACK(br0) 192.168.1.191 d0:81:7a:d5:5e:e0 Geoffroys-iPro May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected DFS-exit channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: selected channel spec: 0xe03a (52/80) May 5 05:05:22 acsd: acs_set_chspec: 0xe03a (52/80) for reason APCS_INIT May 5 05:05:22 kernel: usbcore: registered new interface driver usbfs May 5 05:05:22 kernel: usbcore: registered new interface driver hub May 5 05:05:22 kernel: usbcore: registered new device driver usb May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_acm May 5 05:05:22 kernel: cdc_acm: v0.26:USB Abstract Control Model driver for USB modems and ISDN adapters May 5 05:05:22 kernel: usbcore: registered new interface driver asix May 5 05:05:22 syslog: module ax88179_178a not found in modules.dep May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_ether May 5 05:05:22 Mastiff: init May 5 05:05:22 kernel: usbcore: registered new interface driver rndis_host May 5 05:05:22 kernel: cdc_ncm: 14-Mar-2012 May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_ncm May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_wdm May 5 05:05:22 kernel: usbcore: registered new interface driver qmi_wwan May 5 05:05:22 kernel: cdc_mbim: loaded May 5 05:05:22 kernel: usbcore: registered new interface driver cdc_mbim May 5 05:05:22 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: xHCI Host Controller May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: new USB bus registered, assigned bus number 1 May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: irq 112, io mem 0x18023000 May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: Failed to enable MSI-X May 5 05:05:24 kernel: xhci_hcd 0000:00:0c.0: failed to allocate MSI entry May 5 05:05:24 kernel: usb usb1: No SuperSpeed endpoint companion for config 1 interface 0 altsetting 0 ep 129: using minimum values May 5 05:05:24 kernel: hub 1-0:1.0: USB hub found May 5 05:05:24 kernel: hub 1-0:1.0: 1 port detected May 5 05:05:24 kernel: [xhci-hub] usb2mode:[0] May 5 05:05:24 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: EHCI Host Controller May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: new USB bus registered, assigned bus number 2 May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: irq 111, io mem 0x18021000 May 5 05:05:24 kernel: ehci_hcd 0000:00:0b.1: USB 0.0 started, EHCI 1.00 May 5 05:05:24 kernel: hub 2-0:1.0: USB hub found May 5 05:05:24 kernel: hub 2-0:1.0: 2 ports detected May 5 05:05:24 kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: OHCI Host Controller May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: new USB bus registered, assigned bus number 3 May 5 05:05:24 kernel: ohci_hcd 0000:00:0b.0: irq 111, io mem 0x18022000 May 5 05:05:24 kernel: hub 3-0:1.0: USB hub found May 5 05:05:24 kernel: hub 3-0:1.0: 2 ports detected May 5 05:05:24 kernel: SCSI subsystem initialized May 5 05:05:24 kernel: csw_retry 100 May 5 05:05:24 kernel: Initializing USB Mass Storage driver... May 5 05:05:24 kernel: usbcore: registered new interface driver usb-storage May 5 05:05:24 kernel: USB Mass Storage support registered. May 5 05:05:25 kernel: Tuxera FAT 12/16/32 driver version 3015.1.29.5_1 [Flags: R/W MODULE]. May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: Tuxera NTFS driver 3018.6.5.3 [Flags: R/W MODULE]. May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: Tuxera HFS+ driver 3017.6.20 May 5 05:05:25 kernel: Built against headers 2.6.36.4brcmarm #1 SMP PREEMPT Mon Jul 9 15:09:39 CST 2018 arm May 5 05:05:25 kernel: Running on kernel 2.6.36.4brcmarm #1 SMP PREEMPT Sat May 2 02:47:43 EDT 2020 armv7l May 5 05:05:25 kernel: usbcore: registered new interface driver usblp May 5 05:05:49 rc_service: httpd 241:notify_rc start_dsl_autodet May 5 05:05:51 rc_service: httpd 241:notify_rc start_dsl_autodet May 5 05:06:23 DSL: Link down -> up May 5 05:06:26 WAN_Connection: Ethernet link up. May 5 05:06:26 rc_service: wanduck 189:notify_rc restart_wan_if 0 May 5 05:06:27 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:06:30 dnsmasq[227]: read /etc/hosts - 6 addresses May 5 05:06:31 WAN_Connection: ISP's DHCP did not function properly. May 5 05:06:42 rc_service: httpd 241:notify_rc restart_dsl_setting; May 5 05:06:53 DSL: Link up -> down May 5 05:07:05 WAN_Connection: Ethernet link down. May 5 05:07:16 rc_service: httpd 241:notify_rc chpass May 5 05:07:16 rc_service: httpd 241:notify_rc restart_ftpsamba May 5 05:07:16 rc_service: waitting "chpass" via httpd ... May 5 05:07:17 lldpd[965]: could not open either /etc/os-release or /usr/lib/os-release May 5 05:07:17 lldpd[965]: lsb_release information not available May 5 05:07:17 lldpd[969]: created chroot directory /var/run/lldpd May 5 05:07:17 lldpd[969]: protocol LLDP enabled May 5 05:07:17 lldpd[969]: protocol CDPv1 disabled May 5 05:07:17 lldpd[969]: protocol CDPv2 disabled May 5 05:07:17 lldpd[969]: protocol SONMP disabled May 5 05:07:17 lldpd[969]: protocol EDP disabled May 5 05:07:17 lldpd[969]: protocol FDP disabled May 5 05:07:17 lldpd[969]: libevent 2.0.21-stable initialized with epoll method May 5 05:07:18 lldpd[969]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted May 5 05:07:18 lldpd[969]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted May 5 05:07:18 lldpcli[967]: lldpd should resume operations May 5 05:07:20 FTP_Server: daemon is stopped May 5 05:07:20 Samba_Server: smb daemon is stopped May 5 05:07:20 dnsmasq[227]: exiting on receipt of SIGTERM May 5 05:07:20 kernel: gro disabled May 5 05:07:20 dnsmasq[987]: started, version 2.81-32-g93cb543 cachesize 1500 May 5 05:07:20 dnsmasq[987]: asynchronous logging enabled, queue limit is 5 messages May 5 05:07:20 dnsmasq-dhcp[987]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d May 5 05:07:20 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:24 rc_service: httpd 241:notify_rc restart_dsl_wireless 0; May 5 05:07:26 kernel: device eth1 left promiscuous mode May 5 05:07:26 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:26 kernel: device eth2 left promiscuous mode May 5 05:07:26 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:28 kernel: device eth1 entered promiscuous mode May 5 05:07:28 kernel: br0: topology change detected, propagating May 5 05:07:28 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:28 kernel: br0: port 2(eth1) entering forwarding state May 5 05:07:28 kernel: device eth2 entered promiscuous mode May 5 05:07:28 kernel: br0: topology change detected, propagating May 5 05:07:28 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:28 kernel: br0: port 3(eth2) entering forwarding state May 5 05:07:29 syslog: wlceventd Start... May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected DFS-exit channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: Adjusted channel spec: 0x1001 (1) May 5 05:07:32 acsd: selected channel spec: 0x1001 (1) May 5 05:07:32 acsd: acs_set_chspec: 0x1001 (1) for reason APCS_INIT May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected DFS-exit channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: Adjusted channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: selected channel spec: 0xe03a (52/80) May 5 05:07:36 acsd: acs_set_chspec: 0xe03a (52/80) for reason APCS_INIT May 5 05:07:36 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:43 rc_service: watchdog 247:notify_rc start_cfgsync May 5 05:07:43 rc_service: waitting "restart_dsl_wireless 0;" via httpd ... May 5 05:07:45 pppd[1083]: Plugin rp-pppoe.so loaded. May 5 05:07:45 pppd[1083]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.7 May 5 05:07:45 pppd[1086]: pppd 2.4.7 started by admin, uid 0 May 5 05:07:58 kernel: nf_conntrack_rtsp v0.6.21 loading May 5 05:07:58 kernel: nf_nat_rtsp v0.6.21 loading May 5 05:07:58 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:07:58 zcip_client: configured 169.254.104.180 May 5 05:08:21 pppd[1086]: Timeout waiting for PADO packets May 5 05:08:43 DSL: Link down -> up May 5 05:08:45 WAN_Connection: Ethernet link up. May 5 05:08:45 rc_service: wanduck 189:notify_rc restart_wan_if 0 May 5 05:08:45 pppd[1086]: Unable to complete PPPoE Discovery May 5 05:08:46 pppd[1086]: Hangup (SIGHUP) May 5 05:08:46 pppd[1086]: Terminating on signal 15 May 5 05:08:46 pppd[1086]: Exit. May 5 05:08:46 lldpd[969]: removal request for address of 169.254.104.180%6, but no knowledge of it May 5 05:08:46 pppd[1285]: Plugin rp-pppoe.so loaded. May 5 05:08:46 pppd[1285]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.7 May 5 05:08:47 pppd[1287]: pppd 2.4.7 started by admin, uid 0 May 5 05:08:47 pppd[1287]: PPP session is 1 (0x1) May 5 05:08:47 pppd[1287]: Connected to 00:02:3b:10:44:12 via interface vlan3880 May 5 05:08:47 pppd[1287]: Using interface ppp0 May 5 05:08:47 pppd[1287]: Connect: ppp0 <--> vlan3880 May 5 05:08:50 pppd[1287]: PAP authentication succeeded May 5 05:08:50 pppd[1287]: peer from calling number 00:02:3B:10:44:12 authorized May 5 05:08:50 WAN_Connection: Fail to connect with some issues. May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:51 pppd[1287]: local IP address 78.180.161.21 May 5 05:08:51 pppd[1287]: remote IP address 78.180.160.1 May 5 05:08:51 pppd[1287]: primary DNS address 195.175.39.49 May 5 05:08:51 pppd[1287]: secondary DNS address 195.175.39.50 May 5 05:08:51 lldpd[969]: removal request for address of 78.180.160.1%12, but no knowledge of it May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:51 lldpd[969]: removal request for address of 78.180.161.21%12, but no knowledge of it May 5 05:08:52 nat: apply nat rules (/tmp/nat_rules_ppp0_vlan3880) May 5 05:08:52 dnsmasq[987]: read /etc/hosts - 6 addresses May 5 05:08:52 dnsmasq[987]: using nameserver 195.175.39.50#53 May 5 05:08:52 dnsmasq[987]: using nameserver 195.175.39.49#53 May 5 05:08:53 wan: finish adding multi routes May 5 05:08:53 rc_service: ip-up 1300:notify_rc stop_ntpd May 5 05:08:53 rc_service: ip-up 1300:notify_rc start_ntpd May 5 05:08:53 rc_service: waitting "stop_ntpd" via ip-up ... May 5 05:08:54 ntpd: Started ntpd May 5 05:08:54 miniupnpd[1348]: HTTP listening on port 35152 May 5 05:08:54 miniupnpd[1348]: Listening for NAT-PMP/PCP traffic on port 5351 May 5 05:08:56 WAN_Connection: WAN was restored. Mar 8 21:33:06 ntpd: Initial clock set Mar 8 21:33:06 rc_service: ntpd_synced 1374:notify_rc restart_diskmon Mar 8 21:33:06 disk_monitor: Finish Mar 8 21:33:07 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:33:07 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:33:07 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:33:07 rc_service: httpd 241:notify_rc start_webs_update Mar 8 21:33:08 disk_monitor: be idle Mar 8 21:33:10 crond[236]: time disparity of 1495705 minutes detected Mar 8 21:33:10 nat: apply nat rules (/tmp/nat_rules_ppp0_vlan3880) Mar 8 21:33:10 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:33:10 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:33:10 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:33:10 zcip_client: configured 169.254.104.180 Mar 8 21:33:58 openvpn: Resetting client (unit 1) to default settings Mar 8 21:34:31 rc_service: httpd 241:notify_rc start_vpnrouting1 Mar 8 21:34:41 rc_service: httpd 241:notify_rc start_vpnclient1 Mar 8 21:34:41 kernel: tun: Universal TUN/TAP device driver, 1.6 Mar 8 21:34:41 kernel: tun: (C) 1999-2004 Max Krasnyansky < maxk@qualcomm.com> Mar 8 21:34:43 ovpn-client1[1822]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 2 2020 Mar 8 21:34:43 ovpn-client1[1822]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.08 Mar 8 21:34:43 ovpn-client1[1823]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:34:43 ovpn-client1[1823]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:34:43 ovpn-client1[1823]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:34:43 ovpn-client1[1823]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:34:43 ovpn-client1[1823]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:34:44 ovpn-client1[1823]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:34:44 ovpn-client1[1823]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:34:44 ovpn-client1[1823]: UDP link local: (not bound) Mar 8 21:34:44 ovpn-client1[1823]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:34:44 ovpn-client1[1823]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=ed923a13 c6b24903 Mar 8 21:34:44 ovpn-client1[1823]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:34:44 ovpn-client1[1823]: VERIFY KU OK Mar 8 21:34:44 ovpn-client1[1823]: Validating certificate extended key usage Mar 8 21:34:44 ovpn-client1[1823]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:34:44 ovpn-client1[1823]: VERIFY EKU OK Mar 8 21:34:44 ovpn-client1[1823]: VERIFY X509NAME OK: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Mar 8 21:34:44 ovpn-client1[1823]: VERIFY OK: depth=0, CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Mar 8 21:34:44 ovpn-client1[1823]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 256 bit EC, curve: prime256v1 Mar 8 21:34:44 ovpn-client1[1823]: raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe Peer Connection Initiated with [AF_INET]86.194.123.126:12346 Mar 8 21:34:45 ovpn-client1[1823]: SENT CONTROL
(status=1) Mar 8 21:34:45 ovpn-client1[1823]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.10 255.255.255.0,peer-id 8,cipher AES-256-GCM' Mar 8 21:34:45 ovpn-client1[1823]: Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:3: block-outside-dns (2.4.9) Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: timers and/or timeouts modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: --ifconfig/up options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: route options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: route-related options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: peer-id set Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: adjusting link_mtu to 1624 Mar 8 21:34:45 ovpn-client1[1823]: OPTIONS IMPORT: data channel crypto options modified Mar 8 21:34:45 ovpn-client1[1823]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 8 21:34:45 ovpn-client1[1823]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 8 21:34:45 ovpn-client1[1823]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 8 21:34:45 ovpn-client1[1823]: TUN/TAP device tun11 opened Mar 8 21:34:45 ovpn-client1[1823]: TUN/TAP TX queue length set to 1000 Mar 8 21:34:45 ovpn-client1[1823]: /sbin/ifconfig tun11 10.8.0.10 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255 Mar 8 21:34:45 lldpd[969]: removal request for address of 10.8.0.10%13, but no knowledge of it Mar 8 21:34:45 lldpd[969]: removal request for address of 10.8.0.10%13, but no knowledge of it Mar 8 21:34:45 ovpn-client1[1823]: updown.sh tun11 1500 1552 10.8.0.10 255.255.255.0 init Mar 8 21:34:46 rc_service: service 1902:notify_rc updateresolv Mar 8 21:34:46 dnsmasq[987]: read /etc/hosts - 6 addresses Mar 8 21:34:46 dnsmasq[987]: using nameserver 8.8.4.4#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 8.8.8.8#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 195.175.39.50#53 Mar 8 21:34:46 dnsmasq[987]: using nameserver 195.175.39.49#53 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 86.194.123.126 netmask 255.255.255.255 gw 78.180.160.1 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1 Mar 8 21:34:49 ovpn-client1[1823]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1 Mar 8 21:34:49 openvpn-routing: Configuring policy rules for client 1 Mar 8 21:34:49 ovpn-client1[1823]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 8 21:34:49 ovpn-client1[1823]: Initialization Sequence Completed
Mar 8 21:44:00 rc_service: httpd 316:notify_rc stop_vpnclient1 Mar 8 21:44:00 ovpn-client1[1980]: SIGTERM[hard,init_instance] received, process exiting Mar 8 21:44:40 rc_service: httpd 316:notify_rc start_vpnclient1 Mar 8 21:44:42 ovpn-client1[2443]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Mar 8 21:44:42 ovpn-client1[2443]: OpenVPN 2.5.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 8 2021 Mar 8 21:44:42 ovpn-client1[2443]: library versions: OpenSSL 1.1.1i 8 Dec 2020, LZO 2.08 Mar 8 21:44:42 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:42 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:43 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:43 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:43 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:43 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=75260ccd 3071b640 Mar 8 21:44:43 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:43 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:43 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:43 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:43 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:43 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:43 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:43 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:43 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:43 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:43 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:48 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:48 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:48 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:48 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:48 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:48 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:49 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=fdeba33e f8428c9a Mar 8 21:44:49 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:49 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:49 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:49 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:49 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:49 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:49 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:49 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:49 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:49 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:49 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:54 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:54 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:54 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:54 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:54 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:54 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=9eee7f8c 45f50c10 Mar 8 21:44:54 ovpn-client1[2444]: VERIFY OK: depth=1, CN=ChangeMe Mar 8 21:44:54 ovpn-client1[2444]: VERIFY KU OK Mar 8 21:44:54 ovpn-client1[2444]: Validating certificate extended key usage Mar 8 21:44:54 ovpn-client1[2444]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 8 21:44:54 ovpn-client1[2444]: VERIFY EKU OK Mar 8 21:44:54 ovpn-client1[2444]: VERIFY X509NAME ERROR: CN=raspberrypi_026c2337-661a-4eec-a702-7a9012cb41fe, must be raspberrypi_026c2337-661a-4eec- Mar 8 21:44:54 ovpn-client1[2444]: OpenSSL: error:1416F086:lib(20):func(367):reason(134) Mar 8 21:44:54 ovpn-client1[2444]: TLS_ERROR: BIO read tls_read_plaintext error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS object -> incoming plaintext read error Mar 8 21:44:54 ovpn-client1[2444]: TLS Error: TLS handshake failed Mar 8 21:44:54 ovpn-client1[2444]: SIGUSR1[soft,tls-error] received, process restarting Mar 8 21:44:54 ovpn-client1[2444]: Restart pause, 5 second(s) Mar 8 21:44:59 ovpn-client1[2444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mar 8 21:44:59 ovpn-client1[2444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mar 8 21:44:59 ovpn-client1[2444]: TCP/UDP: Preserving recently used remote address: [AF_INET]86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: Socket Buffers: R=[122880->122880] S=[122880->122880] Mar 8 21:44:59 ovpn-client1[2444]: UDP link local: (not bound) Mar 8 21:44:59 ovpn-client1[2444]: UDP link remote: [AF_INET] 86.194.123.126:12346 Mar 8 21:44:59 ovpn-client1[2444]: TLS: Initial packet from [AF_INET] 86.194.123.126:12346, sid=b7be62db 7f2a0545
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/gnuton/asuswrt-merlin.ng/issues/88#issuecomment-793103879, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAEMYRBDM5BXLOWD6MDDL4TTCVAXVANCNFSM4Y2B37NQ .
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub, or unsubscribe.
Firmware Version Affected 386.01
Is this bug present in upstream Merlin releases too? Don't know
Describe the bug I have two OpneVPN client connection. They both do not work after upgrade to 386.01.
To Reproduce I reseted to factory setting and created the openvpn connection but still does not work.