Feb 28 00:36:06 ovpn-client2[19600]: OpenVPN 2.4.7 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 25 2019
Feb 28 00:36:06 ovpn-client2[19600]: library versions: OpenSSL 1.1.1a 20 Nov 2018, LZO 2.08
Feb 28 00:36:06 ovpn-client2[19601]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 28 00:36:06 ovpn-client2[19601]: TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.10.183:1194
Feb 28 00:36:06 ovpn-client2[19601]: Socket Buffers: R=[122880->122880] S=[122880->122880]
Feb 28 00:36:06 ovpn-client2[19601]: UDP link local: (not bound)
Feb 28 00:36:06 ovpn-client2[19601]: UDP link remote: [AF_INET]192.168.10.183:1194
Feb 28 00:36:06 ovpn-client2[19601]: TLS: Initial packet from [AF_INET]192.168.10.183:1194, sid=1df4803c bdb5f55f
Feb 28 00:36:06 ovpn-client2[19601]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Feb 28 00:36:06 ovpn-client2[19601]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC86U, emailAddress=me@myhost.mydomain
Feb 28 00:36:06 ovpn-client2[19601]: VERIFY KU OK
Feb 28 00:36:06 ovpn-client2[19601]: Validating certificate extended key usage
Feb 28 00:36:06 ovpn-client2[19601]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 28 00:36:06 ovpn-client2[19601]: VERIFY EKU OK
Feb 28 00:36:06 ovpn-client2[19601]: VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-AC86U, emailAddress=me@myhost.mydomain
Feb 28 00:36:06 ovpn-client2[19601]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
Feb 28 00:36:06 ovpn-client2[19601]: [RT-AC86U] Peer Connection Initiated with [AF_INET]192.168.10.183:1194
Feb 28 00:36:07 ovpn-client2[19601]: SENT CONTROL [RT-AC86U]: 'PUSH_REQUEST' (status=1)
Feb 28 00:36:07 ovpn-client2[19601]: PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0 vpn_gateway 500,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Feb 28 00:36:07 ovpn-client2[19601]: OPTIONS IMPORT: timers and/or timeouts modified
Feb 28 00:36:07 ovpn-client2[19601]: OPTIONS IMPORT: --ifconfig/up options modified
Feb 28 00:36:07 ovpn-client2[19601]: OPTIONS IMPORT: route options modified
Feb 28 00:36:07 ovpn-client2[19601]: OPTIONS IMPORT: route-related options modified
Feb 28 00:36:07 ovpn-client2[19601]: OPTIONS IMPORT: peer-id set
Feb 28 00:36:07 ovpn-client2[19601]: OPTIONS IMPORT: adjusting link_mtu to 1624
Feb 28 00:36:07 ovpn-client2[19601]: OPTIONS IMPORT: data channel crypto options modified
Feb 28 00:36:07 ovpn-client2[19601]: Data Channel: using negotiated cipher 'AES-256-GCM'
Feb 28 00:36:07 ovpn-client2[19601]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 28 00:36:07 ovpn-client2[19601]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 28 00:36:07 ovpn-client2[19601]: TUN/TAP device tun12 opened
Feb 28 00:36:07 ovpn-client2[19601]: TUN/TAP TX queue length set to 100
Feb 28 00:36:07 ovpn-client2[19601]: /usr/sbin/ip link set dev tun12 up mtu 1500
Feb 28 00:36:07 ovpn-client2[19601]: /usr/sbin/ip addr add dev tun12 10.8.0.2/24 broadcast 10.8.0.255
Feb 28 00:36:07 ovpn-client2[19601]: updown.sh tun12 1500 1552 10.8.0.2 255.255.255.0 init
Feb 28 00:36:10 ovpn-client2[19601]: Ignore conflicted routing rule: 192.168.1.0 255.255.255.0
Feb 28 00:36:10 ovpn-client2[19601]: Initialization Sequence Completed