Thu Feb 13 16:34:46 2020 OpenVPN 2.4.8 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Feb 13 16:34:46 2020 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
Thu Feb 13 16:34:46 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Feb 13 16:34:46 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Feb 13 16:34:46 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Feb 13 16:34:46 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Feb 13 16:34:46 2020 nice -20 succeeded
Thu Feb 13 16:34:46 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]185.180.12.49:1194
Thu Feb 13 16:34:46 2020 Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Feb 13 16:34:46 2020 UDP link local: (not bound)
Thu Feb 13 16:34:46 2020 UDP link remote: [AF_INET]185.180.12.49:1194
Thu Feb 13 16:34:46 2020 TLS: Initial packet from [AF_INET]185.180.12.49:1194, sid=38c59291 5dd99acf
Thu Feb 13 16:34:46 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Feb 13 16:34:46 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
Thu Feb 13 16:34:46 2020 VERIFY KU OK
Thu Feb 13 16:34:46 2020 Validating certificate extended key usage
Thu Feb 13 16:34:46 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Feb 13 16:34:46 2020 VERIFY EKU OK
Thu Feb 13 16:34:46 2020 VERIFY OK: depth=0, CN=at55.nordvpn.com
Thu Feb 13 16:34:46 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Feb 13 16:34:46 2020 [at55.nordvpn.com] Peer Connection Initiated with [AF_INET]185.180.12.49:1194
Thu Feb 13 16:34:47 2020 SENT CONTROL [at55.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Feb 13 16:34:47 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.2.30 255.255.255.0,peer-id 33,cipher AES-256-GCM'
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: timers and/or timeouts modified
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: explicit notify parm(s) modified
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: compression parms modified
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Feb 13 16:34:47 2020 Socket Buffers: R=[327680->327680] S=[327680->327680]
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: --ifconfig/up options modified
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: route options modified
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: route-related options modified
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: peer-id set
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Feb 13 16:34:47 2020 OPTIONS IMPORT: data channel crypto options modified
Thu Feb 13 16:34:47 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Feb 13 16:34:47 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Feb 13 16:34:47 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Feb 13 16:34:47 2020 TUN/TAP device tun21 opened
Thu Feb 13 16:34:47 2020 TUN/TAP TX queue length set to 1000
Thu Feb 13 16:34:47 2020 /sbin/ifconfig tun21 10.8.2.30 netmask 255.255.255.0 mtu 1500 broadcast 10.8.2.255
Thu Feb 13 16:34:47 2020 /etc/openvpn/ovpnclient-up.sh tun21 1500 1585 10.8.2.30 255.255.255.0 init
Thu Feb 13 16:34:47 2020 /sbin/route add -net 185.180.12.49 netmask 255.255.255.255 gw 62.155.243.132
Thu Feb 13 16:34:47 2020 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
Thu Feb 13 16:34:47 2020 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
Thu Feb 13 16:34:47 2020 Initialization Sequence Completed
Thu Feb 13 16:40:13 2020 [at55.nordvpn.com] Inactivity timeout (--ping-restart), restarting
Thu Feb 13 16:40:13 2020 SIGUSR1[soft,ping-restart] received, process restarting
Thu Feb 13 16:40:13 2020 Restart pause, 5 second(s)
Thu Feb 13 16:40:18 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Feb 13 16:40:18 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]185.180.12.49:1194
Thu Feb 13 16:40:18 2020 Socket Buffers: R=[212992->425984] S=[212992->425984]
Thu Feb 13 16:40:18 2020 UDP link local: (not bound)
Thu Feb 13 16:40:18 2020 UDP link remote: [AF_INET]185.180.12.49:1194
Thu Feb 13 16:40:41 2020 event_wait : Interrupted system call (code=4)
Thu Feb 13 16:40:41 2020 /sbin/route del -net 185.180.12.49 netmask 255.255.255.255
route: SIOC[ADD|DEL]RT: No such process
Thu Feb 13 16:40:41 2020 ERROR: Linux route delete command failed: external program exited with error status: 1
Thu Feb 13 16:40:41 2020 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
Thu Feb 13 16:40:41 2020 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
Thu Feb 13 16:40:41 2020 Closing TUN/TAP interface
Thu Feb 13 16:40:41 2020 /sbin/ifconfig tun21 0.0.0.0
Thu Feb 13 16:40:41 UTC 2020 Voxel: Error: openvpn-client stop: process was not killed properly 2, try a new kill!
Thu Feb 13 16:40:41 UTC 2020 Voxel: Error: openvpn-client stop: process was not killed properly 2, try a new kill!
Thu Feb 13 16:40:41 UTC 2020 Voxel: Error: openvpn-client stop: process was not killed properly 2, try a new kill!
Thu Feb 13 16:40:41 UTC 2020 Voxel: OpenVPNclient stop run: ip route del:
default via 62.155.243.132 dev ppp0
62.155.243.132 dev ppp0 proto kernel scope link src 217.86.109.76
192.168.178.0/24 dev br0 proto kernel scope link src 192.168.178.1
239.0.0.0/8 dev br0 scope link
Thu Feb 13 16:42:05 2020 OpenVPN 2.4.8 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Feb 13 16:42:05 2020 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
Thu Feb 13 16:42:05 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Feb 13 16:42:05 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Feb 13 16:42:05 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Feb 13 16:42:05 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Feb 13 16:42:05 2020 nice -20 succeeded
Thu Feb 13 16:42:05 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]185.180.12.49:1194
Thu Feb 13 16:42:05 2020 Socket Buffers: R=[212992->425984] S=[212992->425984]
Thu Feb 13 16:42:05 2020 UDP link local: (not bound)
Thu Feb 13 16:42:05 2020 UDP link remote: [AF_INET]185.180.12.49:1194
Thu Feb 13 16:42:05 2020 TLS: Initial packet from [AF_INET]185.180.12.49:1194, sid=cbcb7093 9d9d19f5
Thu Feb 13 16:42:05 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Feb 13 16:42:05 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
Thu Feb 13 16:42:05 2020 VERIFY KU OK
Thu Feb 13 16:42:05 2020 Validating certificate extended key usage
Thu Feb 13 16:42:05 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Feb 13 16:42:05 2020 VERIFY EKU OK
Thu Feb 13 16:42:05 2020 VERIFY OK: depth=0, CN=at55.nordvpn.com
Thu Feb 13 16:42:05 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Feb 13 16:42:05 2020 [at55.nordvpn.com] Peer Connection Initiated with [AF_INET]185.180.12.49:1194
Thu Feb 13 16:42:07 2020 SENT CONTROL [at55.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Feb 13 16:42:07 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.21 255.255.255.0,peer-id 23,cipher AES-256-GCM'
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: timers and/or timeouts modified
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: explicit notify parm(s) modified
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: compression parms modified
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Feb 13 16:42:07 2020 Socket Buffers: R=[425984->425984] S=[425984->425984]
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: --ifconfig/up options modified
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: route options modified
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: route-related options modified
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: peer-id set
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Feb 13 16:42:07 2020 OPTIONS IMPORT: data channel crypto options modified
Thu Feb 13 16:42:07 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Feb 13 16:42:07 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Feb 13 16:42:07 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Feb 13 16:42:07 2020 TUN/TAP device tun21 opened
Thu Feb 13 16:42:07 2020 TUN/TAP TX queue length set to 1000
Thu Feb 13 16:42:07 2020 /sbin/ifconfig tun21 10.8.0.21 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
Thu Feb 13 16:42:07 2020 /etc/openvpn/ovpnclient-up.sh tun21 1500 1585 10.8.0.21 255.255.255.0 init
Thu Feb 13 16:42:07 2020 /sbin/route add -net 185.180.12.49 netmask 255.255.255.255 gw 62.155.243.132
Thu Feb 13 16:42:07 2020 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
Thu Feb 13 16:42:07 2020 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
Thu Feb 13 16:42:07 2020 Initialization Sequence Completed