A lot of my own development was tested using a PIA account as well, no problem there.
Thanks, Merlin. That is a good indication that it might be my provider then.
ALso thanks to everyone for all the replies. I will do more testing with the pings.
This is my latest log. I have 2 tunnels open (UDP on 1198) (TCP on 502) and they seem to be going down but then reconnecting.
Mar 28 12:20:42 ovpn-client2[4822]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Mar 28 12:20:42 ovpn-client2[4822]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Mar 28 12:22:47 ovpn-client2[4822]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 28 12:22:47 ovpn-client2[4822]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Mar 28 12:22:47 ovpn-client2[4822]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Mar 28 12:22:53 openvpn-routing: Configuring policy rules for client 2
Mar 28 12:22:53 openvpn-routing: Removing rule 10301 from routing policy
Mar 28 12:22:53 openvpn-routing: Tunnel down - VPN client access blocked
Mar 28 12:22:53 openvpn-routing: Adding route for 192.168.1.10 to 0.0.0.0 through VPN client 2
Mar 28 12:22:53 openvpn-routing: Completed routing policy configuration for client 2
Mar 28 12:22:53 ovpn-client2[4822]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 12:22:53 ovpn-client2[4822]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 12:22:53 ovpn-client2[4822]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 12:22:56 openvpn-routing: Configuring policy rules for client 2
Mar 28 12:22:57 openvpn-routing: Creating VPN routing table (mode 2)
Mar 28 12:22:57 openvpn-routing: Removing route for 10.13.10.1 to tun12 from main routing table
Mar 28 12:22:57 openvpn-routing: Removing route for 0.0.0.0/1 to tun12 from main routing table
Mar 28 12:22:57 openvpn-routing: Removing route for 128.0.0.0/1 to tun12 from main routing table
Mar 28 12:22:57 openvpn-routing: Removing rule 10301 from routing policy
Mar 28 12:22:57 openvpn-routing: Adding route for 192.168.1.10 to 0.0.0.0 through VPN client 2
Mar 28 12:22:57 openvpn-routing: Tunnel re-established, restoring WAN access to clients
Mar 28 12:22:57 openvpn-routing: Completed routing policy configuration for client 2
Mar 28 13:14:07 ovpn-client1[5159]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Mar 28 13:14:07 ovpn-client1[5159]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Mar 28 13:14:22 ovpn-client1[5159]: Connection reset, restarting [0]
Mar 28 13:14:27 ovpn-client1[5159]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Mar 28 13:14:27 ovpn-client1[5159]: WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
Mar 28 13:14:27 ovpn-client1[5159]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 28 13:14:30 ovpn-client1[5159]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Mar 28 13:14:30 ovpn-client1[5159]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Mar 28 13:14:30 ovpn-client1[5159]: WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
Mar 28 13:14:31 openvpn-routing: Configuring policy rules for client 1
Mar 28 13:14:31 openvpn-routing: Removing rule 10101 from routing policy
Mar 28 13:14:31 openvpn-routing: Tunnel down - VPN client access blocked
Mar 28 13:14:31 openvpn-routing: Adding route for 192.168.1.100 to 0.0.0.0 through VPN client 1
Mar 28 13:14:31 openvpn-routing: Completed routing policy configuration for client 1
Mar 28 13:14:31 ovpn-client1[5159]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 13:14:31 ovpn-client1[5159]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 13:14:31 ovpn-client1[5159]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 13:14:37 openvpn-routing: Configuring policy rules for client 1
Mar 28 13:14:37 openvpn-routing: Creating VPN routing table (mode 2)
Mar 28 13:14:37 openvpn-routing: Removing route for 10.31.1.1 to tun11 from main routing table
Mar 28 13:14:37 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
Mar 28 13:14:37 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
Mar 28 13:14:37 openvpn-routing: Removing rule 10101 from routing policy
Mar 28 13:14:37 openvpn-routing: Adding route for 192.168.1.100 to 0.0.0.0 through VPN client 1
Mar 28 13:14:37 openvpn-routing: Tunnel re-established, restoring WAN access to clients
Mar 28 13:14:37 openvpn-routing: Completed routing policy configuration for client 1
Mar 28 13:22:47 ovpn-client2[4822]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Mar 28 13:22:47 ovpn-client2[4822]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Mar 28 13:24:52 ovpn-client2[4822]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 28 13:24:53 ovpn-client2[4822]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Mar 28 13:24:53 ovpn-client2[4822]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Mar 28 13:24:55 openvpn-routing: Configuring policy rules for client 2
Mar 28 13:24:55 openvpn-routing: Removing rule 10301 from routing policy
Mar 28 13:24:55 openvpn-routing: Tunnel down - VPN client access blocked
Mar 28 13:24:55 openvpn-routing: Adding route for 192.168.1.10 to 0.0.0.0 through VPN client 2
Mar 28 13:24:55 openvpn-routing: Completed routing policy configuration for client 2
Mar 28 13:24:55 ovpn-client2[4822]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 13:24:55 ovpn-client2[4822]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 13:24:55 ovpn-client2[4822]: ERROR: Linux route delete command failed: external program exited with error status: 2
Mar 28 13:24:58 openvpn-routing: Configuring policy rules for client 2
Mar 28 13:24:58 openvpn-routing: Creating VPN routing table (mode 2)
Mar 28 13:24:58 openvpn-routing: Removing route for 10.24.10.1 to tun12 from main routing table
Mar 28 13:24:58 openvpn-routing: Removing route for 0.0.0.0/1 to tun12 from main routing table
Mar 28 13:24:58 openvpn-routing: Removing route for 128.0.0.0/1 to tun12 from main routing table
Mar 28 13:24:58 openvpn-routing: Removing rule 10301 from routing policy
Mar 28 13:24:59 openvpn-routing: Adding route for 192.168.1.10 to 0.0.0.0 through VPN client 2
Mar 28 13:24:59 openvpn-routing: Tunnel re-established, restoring WAN access to clients
Mar 28 13:24:59 openvpn-routing: Completed routing policy configuration for client 2