I've just started getting the errors in my system logs below. It says that I might be getting attacked by an outside source in the log. Is this correct? If so is there some other way of stopping this type of attack like having packets dropped? Bit of a newbie on this stuff. Using Tun/TCP/443 in order to get through some outside firewalls that block port 1194
Mar 12 00:13:41 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:208.93.152.79:41056
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 TCP connection established with [AF_INET6]::ffff:208.93.152.79:41486
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 Connection reset, restarting [0]
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 WARNING: Bad encapsulated packet length from peer (32814), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 Connection reset, restarting [0]
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 00:13:41 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:208.93.152.79:44128
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 Connection reset, restarting [0]
Mar 12 00:13:41 openvpn[1006]: 208.93.152.79 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 00:13:42 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:208.93.152.79:44422
Mar 12 00:13:42 openvpn[1006]: 208.93.152.79 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 00:13:42 openvpn[1006]: 208.93.152.79 Connection reset, restarting [0]
Mar 12 00:13:42 openvpn[1006]: 208.93.152.79 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 00:13:42 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:208.93.152.79:44706
Mar 12 00:13:42 openvpn[1006]: 208.93.152.79 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 00:13:42 openvpn[1006]: 208.93.152.79 Connection reset, restarting [0]
Mar 12 00:13:42 openvpn[1006]: 208.93.152.79 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 00:13:43 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:208.93.152.79:45006
Mar 12 00:13:43 openvpn[1006]: 208.93.152.79 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 00:13:43 openvpn[1006]: 208.93.152.79 Connection reset, restarting [0]
Mar 12 00:13:43 openvpn[1006]: 208.93.152.79 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 00:13:43 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:208.93.152.79:45190
Mar 12 00:13:43 openvpn[1006]: 208.93.152.79 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 00:13:43 openvpn[1006]: 208.93.152.79 Connection reset, restarting [0]
Mar 12 00:13:43 openvpn[1006]: 208.93.152.79 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 00:13:54 sd-idle-2.6[476]: spinning up /dev/sda after 3 hours 55 mins
Mar 12 00:18:54 sd-idle-2.6[476]: spinning down /dev/sda after 5 mins
Mar 12 01:15:13 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:139.162.124.167:46234
Mar 12 01:15:14 openvpn[1006]: 139.162.124.167 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 01:15:14 openvpn[1006]: 139.162.124.167 Connection reset, restarting [0]
Mar 12 01:15:14 openvpn[1006]: 139.162.124.167 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 01:15:15 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:139.162.124.167:48296
Mar 12 01:15:15 openvpn[1006]: 139.162.124.167 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 01:15:15 openvpn[1006]: 139.162.124.167 Connection reset, restarting [0]
Mar 12 01:15:15 openvpn[1006]: 139.162.124.167 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 01:15:15 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:139.162.124.167:49674
Mar 12 01:15:20 openvpn[1006]: 139.162.124.167 Connection reset, restarting [0]
Mar 12 01:15:20 openvpn[1006]: 139.162.124.167 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 01:15:20 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:139.162.124.167:33074
Mar 12 01:15:26 openvpn[1006]: 139.162.124.167 Connection reset, restarting [0]
Mar 12 01:15:26 openvpn[1006]: 139.162.124.167 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 01:15:26 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:139.162.124.167:44394
Mar 12 01:15:41 openvpn[1006]: 139.162.124.167 Connection reset, restarting [0]
Mar 12 01:15:41 openvpn[1006]: 139.162.124.167 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 01:15:41 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:139.162.124.167:49106
Mar 12 01:15:46 openvpn[1006]: 139.162.124.167 Connection reset, restarting [0]
Mar 12 01:15:46 openvpn[1006]: 139.162.124.167 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 01:15:46 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:139.162.124.167:60694
Mar 12 01:15:57 openvpn[1006]: 139.162.124.167 Connection reset, restarting [0]
Mar 12 01:15:57 openvpn[1006]: 139.162.124.167 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 12 03:58:28 dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.17 30:cd:a7:a4:98:e2
Mar 12 03:58:28 dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.17 30:cd:a7:a4:98:e2 SLM2885FW
Mar 12 04:34:12 dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.15 00:09:34:29:e8:d0
Mar 12 04:34:12 dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.15 00:09:34:29:e8:d0 dm600
Mar 12 07:20:09 openvpn[1006]: TCP connection established with [AF_INET6]::ffff:184.105.139.68:38892
Mar 12 07:20:10 openvpn[1006]: 184.105.139.68 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
Mar 12 07:20:10 openvpn[1006]: 184.105.139.68 Connection reset, restarting [0]
Mar 12 07:20:10 openvpn[1006]: 184.105.139.68 SIGUSR1[soft,connection-reset] received, client-instance restarting