Guest User

Untitled

a guest
Jul 6th, 2020
493
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Firmware: DD-WRT v3.0-r43652 std (07/03/20)
  2.  
  3.  
  4. Client: CONNECTED SUCCESS Local Address: 10.14.0.7
  5. Remote Address: 10.14.0.7
  6.  
  7. Status
  8. VPN Client Stats
  9. TUN/TAP read bytes 152
  10. TUN/TAP write bytes 0
  11. TCP/UDP read bytes 5288
  12. TCP/UDP write bytes 1205
  13. Auth read bytes 16
  14. pre-compress bytes 0
  15. post-compress bytes 0
  16. pre-decompress bytes 0
  17. post-decompress bytes 0
  18.  
  19. Log
  20. Clientlog:
  21. 19691231 18:00:18 W WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
  22. 19691231 18:00:18 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
  23. 19691231 18:00:18 Current Parameter Settings:
  24. 19691231 18:00:18 config = '/tmp/openvpncl/openvpn.conf'
  25. 19691231 18:00:18 mode = 0
  26. 19691231 18:00:18 NOTE: --mute triggered...
  27. 19691231 18:00:18 227 variation(s) on previous 3 message(s) suppressed by --mute
  28. 19691231 18:00:18 I OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 3 2020
  29. 19691231 18:00:18 I library versions: OpenSSL 1.1.1g 21 Apr 2020 LZO 2.09
  30. 19691231 18:00:18 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
  31. 19691231 18:00:18 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  32. 19691231 18:00:18 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  33. 19691231 18:00:18 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  34. 19691231 18:00:18 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  35. 19691231 18:00:18 Local Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-client'
  36. 19691231 18:00:18 Expected Remote Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-server'
  37. 19691231 18:00:18 I TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
  38. 19691231 18:00:18 Socket Buffers: R=[180224->180224] S=[180224->180224]
  39. 19691231 18:00:18 W --mtu-disc is not supported on this OS
  40. 19691231 18:00:18 I UDP link local: (not bound)
  41. 19691231 18:00:18 I UDP link remote: [AF_INET]141.98.255.83:1300
  42. 19691231 18:00:18 TLS: Initial packet from [AF_INET]141.98.255.83:1300 sid=2b7fbbc3 db62db6a
  43. 19691231 18:00:18 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  44. 19691231 18:00:18 N VERIFY ERROR: depth=2 error=certificate is not yet valid: C=SE ST=Gotaland L=Gothenburg O=Amagicom AB OU=Mullvad CN=Mullvad Root CA v2 emailAddress=security@mullvad.net
  45. 19691231 18:00:18 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
  46. 19691231 18:00:18 N TLS_ERROR: BIO read tls_read_plaintext error
  47. 19691231 18:00:18 NOTE: --mute triggered...
  48. 19691231 18:00:18 2 variation(s) on previous 3 message(s) suppressed by --mute
  49. 19691231 18:00:18 TCP/UDP: Closing socket
  50. 19691231 18:00:18 I SIGUSR1[soft tls-error] received process restarting
  51. 19691231 18:00:18 Restart pause 5 second(s)
  52. 20200706 16:12:18 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  53. 20200706 16:12:18 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  54. 20200706 16:12:18 Re-using SSL/TLS context
  55. 20200706 16:12:18 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  56. 20200706 16:12:18 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  57. 20200706 16:12:18 Local Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-client'
  58. 20200706 16:12:18 Expected Remote Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-server'
  59. 20200706 16:12:18 I TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
  60. 20200706 16:12:18 Socket Buffers: R=[180224->180224] S=[180224->180224]
  61. 20200706 16:12:18 W --mtu-disc is not supported on this OS
  62. 20200706 16:12:18 I UDP link local: (not bound)
  63. 20200706 16:12:18 I UDP link remote: [AF_INET]141.98.255.83:1300
  64. 20200706 16:12:18 TLS: Initial packet from [AF_INET]141.98.255.83:1300 sid=ee152f9e 5150a117
  65. 20200706 16:12:18 VERIFY OK: depth=2 C=SE ST=Gotaland L=Gothenburg O=Amagicom AB OU=Mullvad CN=Mullvad Root CA v2 emailAddress=security@mullvad.net
  66. 20200706 16:12:18 VERIFY OK: depth=1 C=SE ST=Gotaland O=Amagicom AB OU=Mullvad CN=Mullvad Intermediate CA v2 emailAddress=security@mullvad.net
  67. 20200706 16:12:18 NOTE: --mute triggered...
  68. 20200706 16:12:18 2 variation(s) on previous 3 message(s) suppressed by --mute
  69. 20200706 16:12:18 I [se-mma-013.mullvad.net] Peer Connection Initiated with [AF_INET]141.98.255.83:1300
  70. 20200706 16:12:19 SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
  71. 20200706 16:12:20 PUSH: Received control message: 'PUSH_REPLY dhcp-option DNS 10.14.0.1 redirect-gateway def1 bypass-dhcp route-ipv6 0000::/2 route-ipv6 4000::/2 route-ipv6 8000::/2 route-ipv6 C000::/2 comp-lzo no route-gateway 10.14.0.1 topology subnet socket-flags TCP_NODELAY ifconfig-ipv6 fdda:d0d0:cafe:1300::1005/64 fdda:d0d0:cafe:1300:: ifconfig 10.14.0.7 255.255.0.0 peer-id 17 cipher AES-256-GCM'
  72. 20200706 16:12:20 OPTIONS IMPORT: compression parms modified
  73. 20200706 16:12:20 NOTE: --mute triggered...
  74. 20200706 16:12:20 1 variation(s) on previous 3 message(s) suppressed by --mute
  75. 20200706 16:12:20 W NOTE: setsockopt TCP_NODELAY=1 failed
  76. 20200706 16:12:20 OPTIONS IMPORT: --ifconfig/up options modified
  77. 20200706 16:12:20 OPTIONS IMPORT: route options modified
  78. 20200706 16:12:20 OPTIONS IMPORT: route-related options modified
  79. 20200706 16:12:20 NOTE: --mute triggered...
  80. 20200706 16:12:20 4 variation(s) on previous 3 message(s) suppressed by --mute
  81. 20200706 16:12:20 Data Channel: using negotiated cipher 'AES-256-GCM'
  82. 20200706 16:12:20 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  83. 20200706 16:12:20 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  84. 20200706 16:12:20 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  85. 20200706 16:12:20 GDG6: remote_host_ipv6=n/a
  86. 20200706 16:12:20 I TUN/TAP device tun1 opened
  87. 20200706 16:12:20 TUN/TAP TX queue length set to 100
  88. 20200706 16:12:20 do_ifconfig tt->did_ifconfig_ipv6_setup=1
  89. 20200706 16:12:20 I /sbin/ifconfig tun1 10.14.0.7 netmask 255.255.0.0 mtu 1500 broadcast 10.14.255.255
  90. 20200706 16:12:20 I /sbin/ifconfig tun1 add fdda:d0d0:cafe:1300::1005/64
  91. 20200706 16:12:20 /sbin/route add -net 141.98.255.83 netmask 255.255.255.255 gw 192.168.1.1
  92. 20200706 16:12:20 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  93. 20200706 16:12:20 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  94. 20200706 16:12:20 I add_route_ipv6(::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  95. 20200706 16:12:20 /sbin/route -A inet6 add ::/2 dev tun1
  96. 20200706 16:12:20 I add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  97. 20200706 16:12:20 /sbin/route -A inet6 add 4000::/2 dev tun1
  98. 20200706 16:12:20 I add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  99. 20200706 16:12:20 /sbin/route -A inet6 add 8000::/2 dev tun1
  100. 20200706 16:12:20 I add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  101. 20200706 16:12:20 /sbin/route -A inet6 add c000::/2 dev tun1
  102. 20200706 16:12:20 I Initialization Sequence Completed
  103. 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  104. 20200706 16:12:33 D MANAGEMENT: CMD 'state'
  105. 20200706 16:12:33 MANAGEMENT: Client disconnected
  106. 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  107. 20200706 16:12:33 D MANAGEMENT: CMD 'state'
  108. 20200706 16:12:33 MANAGEMENT: Client disconnected
  109. 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  110. 20200706 16:12:33 D MANAGEMENT: CMD 'state'
  111. 20200706 16:12:33 MANAGEMENT: Client disconnected
  112. 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  113. 20200706 16:12:33 D MANAGEMENT: CMD 'status 2'
  114. 20200706 16:12:33 MANAGEMENT: Client disconnected
  115. 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  116. 20200706 16:12:33 D MANAGEMENT: CMD 'log 500'
  117. 19691231 18:00:00
  118.  
  119. root@DD-WRT:~# ip route show
  120. 0.0.0.0/1 via 10.14.0.1 dev tun1
  121. default via 192.168.1.1 dev br0
  122. 10.14.0.0/16 dev tun1 scope link src 10.14.0.7
  123. 127.0.0.0/8 dev lo scope link
  124. 128.0.0.0/1 via 10.14.0.1 dev tun1
  125. 141.98.255.83 via 192.168.1.1 dev br0
  126. 192.168.1.0/24 dev br0 scope link src 192.168.1.3
  127. 192.168.1.0/24 dev vlan2 scope link src 192.168.1.2
  128.  
  129. root@DD-WRT:~# ip a
  130. 1: lo: <LOOPBACK,MULTICAST,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
  131. link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
  132. inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
  133. valid_lft forever preferred_lft forever
  134. inet6 ::1/128 scope host
  135. valid_lft forever preferred_lft forever
  136. 2: teql0: <NOARP> mtu 1500 qdisc noop state DOWN qlen 100
  137. link/void
  138. 3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq state UNKNOWN qlen 1000
  139. link/ether d4:6e:0e:42:8d:fc brd ff:ff:ff:ff:ff:ff
  140. inet6 fe80::d66e:eff:fe42:8dfc/64 scope link
  141. valid_lft forever preferred_lft forever
  142. 4: vlan1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br0 state UP qlen 1000
  143. link/ether d4:6e:0e:42:8d:fc brd ff:ff:ff:ff:ff:ff
  144. inet6 fe80::d66e:eff:fe42:8dfc/64 scope link
  145. valid_lft forever preferred_lft forever
  146. 5: vlan2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
  147. link/ether d4:6e:0e:42:8d:fd brd ff:ff:ff:ff:ff:ff
  148. inet 192.168.1.2/24 brd 192.168.1.255 scope global vlan2
  149. valid_lft forever preferred_lft forever
  150. inet6 fe80::d66e:eff:fe42:8dfd/64 scope link
  151. valid_lft forever preferred_lft forever
  152. 6: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq master br0 state UNKNOWN qlen 1000
  153. link/ether d4:6e:0e:42:8d:fe brd ff:ff:ff:ff:ff:ff
  154. inet6 fe80::d66e:eff:fe42:8dfe/64 scope link
  155. valid_lft forever preferred_lft forever
  156. 7: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq master br0 state UNKNOWN qlen 1000
  157. link/ether d4:6e:0e:42:8d:0a brd ff:ff:ff:ff:ff:ff
  158. inet6 fe80::d66e:eff:fe42:8d0a/64 scope link
  159. valid_lft forever preferred_lft forever
  160. 8: sit0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN qlen 1
  161. link/sit 0.0.0.0 brd 0.0.0.0
  162. 9: ip6tnl0@NONE: <NOARP> mtu 1452 qdisc noop state DOWN qlen 1
  163. link/tunnel6 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 brd 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
  164. 10: br0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
  165. link/ether d4:6e:0e:42:8d:fe brd ff:ff:ff:ff:ff:ff
  166. inet 192.168.1.3/24 brd 192.168.1.255 scope global br0
  167. valid_lft forever preferred_lft forever
  168. inet6 fe80::d66e:eff:fe42:8dfe/64 scope link
  169. valid_lft forever preferred_lft forever
  170. 11: tun1: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc sfq state UNKNOWN qlen 100
  171. link/[65534]
  172. inet 10.14.0.7/16 brd 10.14.255.255 scope global tun1
  173. valid_lft forever preferred_lft forever
  174. inet6 fdda:d0d0:cafe:1300::1005/64 scope global
  175. valid_lft forever preferred_lft forever
  176.  
  177.  
  178. root@DD-WRT:~# iptables -L
  179. Chain INPUT (policy ACCEPT)
  180. target prot opt source destination
  181. ACCEPT 0 -- anywhere anywhere
  182. ACCEPT 0 -- anywhere anywhere state RELATED,ESTABLISHED
  183. DROP udp -- anywhere anywhere udp dpt:route
  184. DROP udp -- anywhere anywhere udp dpt:route
  185. ACCEPT udp -- anywhere anywhere udp dpt:route
  186. ACCEPT ipv6 -- anywhere anywhere
  187. DROP icmp -- anywhere anywhere
  188. DROP igmp -- anywhere anywhere
  189. ACCEPT 0 -- anywhere anywhere state NEW
  190. ACCEPT 0 -- anywhere anywhere state NEW
  191. DROP 0 -- anywhere anywhere
  192.  
  193. Chain FORWARD (policy ACCEPT)
  194. target prot opt source destination
  195. ACCEPT 0 -- anywhere anywhere
  196. ACCEPT 0 -- anywhere anywhere
  197. ACCEPT 0 -- anywhere anywhere state RELATED,ESTABLISHED
  198. ACCEPT gre -- 192.168.1.0/24 anywhere
  199. ACCEPT tcp -- 192.168.1.0/24 anywhere tcp dpt:1723
  200. lan2wan 0 -- anywhere anywhere
  201. ACCEPT 0 -- anywhere anywhere
  202. TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
  203. trigger_out 0 -- anywhere anywhere
  204. TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
  205. trigger_out 0 -- anywhere anywhere
  206. ACCEPT 0 -- anywhere anywhere state NEW
  207. TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
  208. trigger_out 0 -- anywhere anywhere
  209. ACCEPT 0 -- anywhere anywhere state NEW
  210. TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
  211. trigger_out 0 -- anywhere anywhere
  212. ACCEPT 0 -- anywhere anywhere state NEW
  213. TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
  214. trigger_out 0 -- anywhere anywhere
  215. ACCEPT 0 -- anywhere anywhere state NEW
  216. ACCEPT 0 -- anywhere anywhere state NEW
  217. DROP 0 -- anywhere anywhere
  218.  
  219. Chain OUTPUT (policy ACCEPT)
  220. target prot opt source destination
  221.  
  222. Chain advgrp_1 (0 references)
  223. target prot opt source destination
  224.  
  225. Chain advgrp_10 (0 references)
  226. target prot opt source destination
  227.  
  228. Chain advgrp_11 (0 references)
  229. target prot opt source destination
  230.  
  231. Chain advgrp_12 (0 references)
  232. target prot opt source destination
  233.  
  234. Chain advgrp_13 (0 references)
  235. target prot opt source destination
  236.  
  237. Chain advgrp_14 (0 references)
  238. target prot opt source destination
  239.  
  240. Chain advgrp_15 (0 references)
  241. target prot opt source destination
  242.  
  243. Chain advgrp_16 (0 references)
  244. target prot opt source destination
  245.  
  246. Chain advgrp_17 (0 references)
  247. target prot opt source destination
  248.  
  249. Chain advgrp_18 (0 references)
  250. target prot opt source destination
  251.  
  252. Chain advgrp_19 (0 references)
  253. target prot opt source destination
  254.  
  255. Chain advgrp_2 (0 references)
  256. target prot opt source destination
  257.  
  258. Chain advgrp_20 (0 references)
  259. target prot opt source destination
  260.  
  261. Chain advgrp_3 (0 references)
  262. target prot opt source destination
  263.  
  264. Chain advgrp_4 (0 references)
  265. target prot opt source destination
  266.  
  267. Chain advgrp_5 (0 references)
  268. target prot opt source destination
  269.  
  270. Chain advgrp_6 (0 references)
  271. target prot opt source destination
  272.  
  273. Chain advgrp_7 (0 references)
  274. target prot opt source destination
  275.  
  276. Chain advgrp_8 (0 references)
  277. target prot opt source destination
  278.  
  279. Chain advgrp_9 (0 references)
  280. target prot opt source destination
  281.  
  282. Chain grp_1 (0 references)
  283. target prot opt source destination
  284.  
  285. Chain grp_10 (0 references)
  286. target prot opt source destination
  287.  
  288. Chain grp_11 (0 references)
  289. target prot opt source destination
  290.  
  291. Chain grp_12 (0 references)
  292. target prot opt source destination
  293.  
  294. Chain grp_13 (0 references)
  295. target prot opt source destination
  296.  
  297. Chain grp_14 (0 references)
  298. target prot opt source destination
  299.  
  300. Chain grp_15 (0 references)
  301. target prot opt source destination
  302.  
  303. Chain grp_16 (0 references)
  304. target prot opt source destination
  305.  
  306. Chain grp_17 (0 references)
  307. target prot opt source destination
  308.  
  309. Chain grp_18 (0 references)
  310. target prot opt source destination
  311.  
  312. Chain grp_19 (0 references)
  313. target prot opt source destination
  314.  
  315. Chain grp_2 (0 references)
  316. target prot opt source destination
  317.  
  318. Chain grp_20 (0 references)
  319. target prot opt source destination
  320.  
  321. Chain grp_3 (0 references)
  322. target prot opt source destination
  323.  
  324. Chain grp_4 (0 references)
  325. target prot opt source destination
  326.  
  327. Chain grp_5 (0 references)
  328. target prot opt source destination
  329.  
  330. Chain grp_6 (0 references)
  331. target prot opt source destination
  332.  
  333. Chain grp_7 (0 references)
  334. target prot opt source destination
  335.  
  336. Chain grp_8 (0 references)
  337. target prot opt source destination
  338.  
  339. Chain grp_9 (0 references)
  340. target prot opt source destination
  341.  
  342. Chain lan2wan (1 references)
  343. target prot opt source destination
  344.  
  345. Chain logaccept (0 references)
  346. target prot opt source destination
  347. ACCEPT 0 -- anywhere anywhere
  348.  
  349. Chain logdrop (0 references)
  350. target prot opt source destination
  351. LOG 0 -- anywhere anywhere state INVALID LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
  352. DROP 0 -- anywhere anywhere
  353.  
  354. Chain logreject (0 references)
  355. target prot opt source destination
  356. REJECT tcp -- anywhere anywhere reject-with tcp-reset
  357.  
  358. Chain trigger_out (5 references)
  359. target prot opt source destination
  360.  
  361.  
  362. Dec 31 18:00:07 DD-WRT syslog.info syslogd started: BusyBox v1.31.1
  363. Dec 31 18:00:07 DD-WRT user.info : ipv6 : successfully started
  364. Dec 31 18:00:07 DD-WRT user.info : resetbutton : resetbutton daemon successfully started
  365. Dec 31 18:00:08 DD-WRT user.info : bridge : bridge br0 successfully added
  366. Dec 31 18:00:08 DD-WRT daemon.info mstpd[615]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 10
  367. Dec 31 18:00:08 DD-WRT daemon.info mstpd[615]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 10
  368. Dec 31 18:00:08 DD-WRT user.info : bridge : interface vlan1 successfully added to bridge br0
  369. Dec 31 18:00:08 DD-WRT user.info : bridge : interface eth1 successfully added to bridge br0
  370. Dec 31 18:00:14 DD-WRT user.info : bridge : interface eth2 successfully added to bridge br0
  371. Dec 31 18:00:14 DD-WRT user.info : wland : daemon successfully started
  372. Dec 31 18:00:14 DD-WRT user.info : telnetd : daemon successfully started
  373. Dec 31 18:00:15 DD-WRT user.info : syslogd : syslog daemon successfully stopped
  374. Dec 31 18:00:15 DD-WRT syslog.info syslogd exiting
  375. Dec 31 18:00:15 DD-WRT syslog.info syslogd started: BusyBox v1.31.1
  376. Dec 31 18:00:15 DD-WRT daemon.info radvd[839]: version 2.18 started
  377. Dec 31 18:00:15 DD-WRT user.info : radvd : RADVD daemon successfully started
  378. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: started, version 2.81 cachesize 1500
  379. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect no-inotify no-dumpfile
  380. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq-dhcp[863]: DHCP, IP range 192.168.1.10 -- 192.168.1.59, lease time 1d
  381. Dec 31 18:00:15 DD-WRT user.info : dnsmasq : daemon successfully started
  382. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain test
  383. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain onion
  384. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain localhost
  385. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain local
  386. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain invalid
  387. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain bind
  388. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: reading /tmp/resolv.dnsmasq
  389. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain test
  390. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain onion
  391. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain localhost
  392. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain local
  393. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain invalid
  394. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain bind
  395. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using nameserver 1.1.1.1#53
  396. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using nameserver 10.8.0.1#53
  397. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using nameserver 193.138.218.74#53
  398. Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: read /etc/hosts - 2 addresses
  399. Dec 31 18:00:15 DD-WRT user.info : cron : daemon successfully started
  400. Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: mode = 0
  401. Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: NOTE: --mute triggered...
  402. Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: 227 variation(s) on previous 3 message(s) suppressed by --mute
  403. Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 3 2020
  404. Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.09
  405. Dec 31 18:00:16 DD-WRT daemon.notice openvpn[935]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
  406. Dec 31 18:00:16 DD-WRT daemon.warn openvpn[935]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  407. Dec 31 18:00:16 DD-WRT daemon.warn openvpn[935]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  408. Dec 31 18:00:16 DD-WRT user.info : dnsmasq : daemon successfully stopped
  409. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[863]: exiting on receipt of SIGTERM
  410. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: started, version 2.81 cachesize 1500
  411. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect no-inotify no-dumpfile
  412. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq-dhcp[1033]: DHCP, IP range 192.168.1.10 -- 192.168.1.59, lease time 1d
  413. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain test
  414. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain onion
  415. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain localhost
  416. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain local
  417. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain invalid
  418. Dec 31 18:00:16 DD-WRT user.info : dnsmasq : daemon successfully started
  419. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain bind
  420. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: reading /tmp/resolv.dnsmasq
  421. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain test
  422. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain onion
  423. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain localhost
  424. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain local
  425. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain invalid
  426. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain bind
  427. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using nameserver 1.1.1.1#53
  428. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using nameserver 10.8.0.1#53
  429. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using nameserver 193.138.218.74#53
  430. Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: read /etc/hosts - 2 addresses
  431. Dec 31 18:00:16 DD-WRT user.info : wland : daemon successfully stopped
  432. Dec 31 18:00:16 DD-WRT user.info : wland : daemon successfully started
  433. Dec 31 18:00:16 DD-WRT user.info : wan : WAN is up. IP: 192.168.1.2
  434. Dec 31 18:00:16 DD-WRT user.info : openvpn : OpenVPN daemon (Client) successfully stopped
  435. Dec 31 18:00:16 DD-WRT daemon.info httpd[1043]: httpd : httpd server started at port 80
  436. Dec 31 18:00:16 DD-WRT user.info : httpd : http daemon successfully started
  437. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[935]: SIGTERM[hard,init_instance] received, process exiting
  438. Dec 31 18:00:18 DD-WRT user.info : dropbear : ssh daemon successfully started
  439. Dec 31 18:00:18 DD-WRT authpriv.info dropbear[1048]: Running in background
  440. Dec 31 18:00:18 DD-WRT user.info : openvpn : OpenVPN daemon (Client) starting/restarting...
  441. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1059]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
  442. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1059]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
  443. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: Current Parameter Settings:
  444. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: config = '/tmp/openvpncl/openvpn.conf'
  445. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: mode = 0
  446. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: NOTE: --mute triggered...
  447. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: 227 variation(s) on previous 3 message(s) suppressed by --mute
  448. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 3 2020
  449. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.09
  450. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
  451. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  452. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  453. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  454. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  455. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  456. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  457. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
  458. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Socket Buffers: R=[180224->180224] S=[180224->180224]
  459. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: --mtu-disc is not supported on this OS
  460. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: UDP link local: (not bound)
  461. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: UDP link remote: [AF_INET]141.98.255.83:1300
  462. Dec 31 18:00:18 DD-WRT user.info : radvd : daemon successfully stopped
  463. Dec 31 18:00:18 DD-WRT daemon.warn radvd[860]: exiting, 1 sigterm(s) received
  464. Dec 31 18:00:18 DD-WRT daemon.info radvd[860]: sending stop adverts
  465. Dec 31 18:00:18 DD-WRT daemon.info radvd[860]: removing /var/run/radvd.pid
  466. Dec 31 18:00:18 DD-WRT daemon.info radvd[860]: returning from radvd main
  467. Dec 31 18:00:18 DD-WRT daemon.info radvd[1062]: version 2.18 started
  468. Dec 31 18:00:18 DD-WRT user.info : radvd : RADVD daemon successfully started
  469. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: TLS: Initial packet from [AF_INET]141.98.255.83:1300, sid=2b7fbbc3 db62db6a
  470. Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  471. Dec 31 18:00:18 DD-WRT daemon.err openvpn[1061]: VERIFY ERROR: depth=2, error=certificate is not yet valid: C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
  472. Dec 31 18:00:18 DD-WRT daemon.err openvpn[1061]: OpenSSL: error:1416F086:lib(20):func(367):reason(134)
  473. Dec 31 18:00:18 DD-WRT daemon.err openvpn[1061]: TLS_ERROR: BIO read tls_read_plaintext error
  474. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
  475. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
  476. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Closing socket
  477. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: SIGUSR1[soft,tls-error] received, process restarting
  478. Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Restart pause, 5 second(s)
  479. Dec 31 18:00:18 DD-WRT user.info : vpn modules : vpn modules successfully unloaded
  480. Dec 31 18:00:18 DD-WRT user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
  481. Dec 31 18:00:18 DD-WRT user.info : vpn modules : nf_nat_proto_gre successfully loaded
  482. Dec 31 18:00:18 DD-WRT user.info : vpn modules : nf_conntrack_pptp successfully loaded
  483. Dec 31 18:00:19 DD-WRT user.info : vpn modules : nf_nat_pptp successfully loaded
  484. Dec 31 18:00:19 DD-WRT user.info : sfe : shortcut forwarding engine successfully started
  485. Dec 31 18:00:19 DD-WRT user.info : process_monitor : successfully started
  486. Dec 31 18:00:19 DD-WRT user.info : ttraff : traffic counter daemon successfully started
  487. Dec 31 18:00:19 DD-WRT daemon.debug ntpclient[1215]: Connecting to 2.pool.ntp.org [193.109.84.119] ...
  488. Jul 6 16:12:17 DD-WRT daemon.info ntpclient[1215]: Time set from 2.pool.ntp.org [193.109.84.119].
  489. Jul 6 16:12:17 DD-WRT daemon.info process_monitor[1214]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
  490. Jul 6 16:12:17 DD-WRT daemon.debug process_monitor[1214]: Restarting cron (time sync change)
  491. Jul 6 16:12:17 DD-WRT user.info : cron : daemon successfully stopped
  492. Jul 6 16:12:17 DD-WRT user.info : cron : daemon successfully started
  493. Jul 6 16:12:17 DD-WRT cron.info cron[1329]: (CRON) STARTUP (fork ok)
  494. Jul 6 16:12:17 DD-WRT user.info : process_monitor : daemon successfully stopped
  495. Jul 6 16:12:17 DD-WRT daemon.info process_monitor[1214]: process_monitor : cleanup timers
  496. Jul 6 16:12:18 DD-WRT daemon.warn openvpn[1061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  497. Jul 6 16:12:18 DD-WRT daemon.warn openvpn[1061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  498. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Re-using SSL/TLS context
  499. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  500. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  501. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  502. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  503. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
  504. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Socket Buffers: R=[180224->180224] S=[180224->180224]
  505. Jul 6 16:12:18 DD-WRT daemon.warn openvpn[1061]: --mtu-disc is not supported on this OS
  506. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: UDP link local: (not bound)
  507. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: UDP link remote: [AF_INET]141.98.255.83:1300
  508. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: TLS: Initial packet from [AF_INET]141.98.255.83:1300, sid=ee152f9e 5150a117
  509. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
  510. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v2, emailAddress=security@mullvad.net
  511. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
  512. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
  513. Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: [se-mma-013.mullvad.net] Peer Connection Initiated with [AF_INET]141.98.255.83:1300
  514. Jul 6 16:12:18 DD-WRT authpriv.info dropbear[1337]: Child connection from 192.168.1.4:54476
  515. Jul 6 16:12:19 DD-WRT daemon.notice openvpn[1061]: SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
  516. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.14.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.14.0.1,
  517. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: compression parms modified
  518. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
  519. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: 1 variation(s) on previous 3 message(s) suppressed by --mute
  520. Jul 6 16:12:20 DD-WRT daemon.warn openvpn[1061]: NOTE: setsockopt TCP_NODELAY=1 failed
  521. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: --ifconfig/up options modified
  522. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route options modified
  523. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route-related options modified
  524. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
  525. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: 4 variation(s) on previous 3 message(s) suppressed by --mute
  526. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Data Channel: using negotiated cipher 'AES-256-GCM'
  527. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  528. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  529. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  530. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: GDG6: remote_host_ipv6=n/a
  531. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: TUN/TAP device tun1 opened
  532. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: TUN/TAP TX queue length set to 100
  533. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: do_ifconfig, tt->did_ifconfig_ipv6_setup=1
  534. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/ifconfig tun1 10.14.0.7 netmask 255.255.0.0 mtu 1500 broadcast 10.14.255.255
  535. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/ifconfig tun1 add fdda:d0d0:cafe:1300::1005/64
  536. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route add -net 141.98.255.83 netmask 255.255.255.255 gw 192.168.1.1
  537. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  538. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
  539. Jul 6 16:12:20 DD-WRT user.info : process_monitor : daemon hanging, send SIGKILL
  540. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  541. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add ::/2 dev tun1
  542. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  543. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add 4000::/2 dev tun1
  544. Jul 6 16:12:20 DD-WRT user.info : process_monitor : successfully started
  545. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  546. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add 8000::/2 dev tun1
  547. Jul 6 16:12:20 DD-WRT daemon.debug process_monitor[1346]: We need to re-update after 3600 seconds
  548. Jul 6 16:12:20 DD-WRT daemon.info process_monitor[1346]: process_monitor : set timer: 3600 seconds, callback: ntp_main()
  549. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
  550. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add c000::/2 dev tun1
  551. Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Initialization Sequence Completed
  552. Jul 6 16:12:23 DD-WRT authpriv.notice dropbear[1337]: Password auth succeeded for 'root' from 192.168.1.4:54476
  553. Jul 6 16:12:24 DD-WRT user.info : nas : wait for network init
  554. Jul 6 16:12:32 DD-WRT user.debug : ttraff: data collection started
  555. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  556. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'state'
  557. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
  558. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  559. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'state'
  560. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
  561. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  562. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'state'
  563. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
  564. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  565. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'status 2'
  566. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
  567. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
  568. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'log 500'
  569. Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
  570. Jul 6 16:12:34 DD-WRT user.info : nas : start nas lan
  571. Jul 6 16:12:34 DD-WRT user.info : nas : start nas for wl0
  572. Jul 6 16:12:34 DD-WRT user.info : nas : NAS lan (wl0 interface) successfully started
  573. Jul 6 16:12:34 DD-WRT user.info : nas : start nas lan
  574. Jul 6 16:12:34 DD-WRT user.info : nas : start nas for wl1
  575. Jul 6 16:12:34 DD-WRT user.info : nas : NAS lan (wl1 interface) successfully started
  576. Jul 6 16:12:35 DD-WRT user.info : nas : daemon successfully stopped
  577. Jul 6 16:12:37 DD-WRT user.info : nas : daemon hanging, send SIGKILL
  578. Jul 6 16:12:37 DD-WRT user.info : nas : start nas lan
  579. Jul 6 16:12:37 DD-WRT user.info : nas : start nas for wl0
  580. Jul 6 16:12:37 DD-WRT user.info : nas : NAS lan (wl0 interface) successfully started
  581. Jul 6 16:12:37 DD-WRT user.info : nas : start nas lan
  582. Jul 6 16:12:37 DD-WRT user.info : nas : start nas for wl1
  583. Jul 6 16:12:37 DD-WRT user.info : nas : NAS lan (wl1 interface) successfully started
  584. Jul 6 16:12:37 DD-WRT user.info : httpd : daemon successfully stopped
  585. Jul 6 16:12:37 DD-WRT daemon.info httpd[1045]: httpd : httpd server shutdown
  586. Jul 6 16:12:37 DD-WRT daemon.info httpd[1471]: httpd : httpd server started at port 80
  587. Jul 6 16:12:37 DD-WRT user.info : httpd : http daemon successfully started
  588. Jul 6 16:12:37 DD-WRT user.info : resetbutton : daemon successfully stopped
  589. Jul 6 16:12:37 DD-WRT user.info : resetbutton : resetbutton daemon successfully started
  590. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: reading /tmp/resolv.dnsmasq
  591. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain test
  592. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain onion
  593. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain localhost
  594. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain local
  595. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain invalid
  596. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain bind
  597. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 10.14.0.1#53
  598. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 1.1.1.1#53
  599. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 10.8.0.1#53
  600. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 193.138.218.74#53
  601. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq-dhcp[1033]: DHCPREQUEST(br0) 192.168.1.19 88:29:9c:d9:66:4d
  602. Jul 6 16:14:43 DD-WRT daemon.info dnsmasq-dhcp[1033]: DHCPACK(br0) 192.168.1.19 88:29:9c:d9:66:4d Galaxy-Tab-A
  603. Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: [se-mma-013.mullvad.net] Inactivity timeout (--ping-restart), restarting
  604. Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Closing socket
  605. Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: SIGUSR1[soft,ping-restart] received, process restarting
  606. Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: Restart pause, 5 second(s)
  607. Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  608. Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  609. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Re-using SSL/TLS context
  610. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  611. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  612. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  613. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  614. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
  615. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Socket Buffers: R=[180224->180224] S=[180224->180224]
  616. Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: NOTE: setsockopt TCP_NODELAY=1 failed
  617. Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: --mtu-disc is not supported on this OS
  618. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: UDP link local: (not bound)
  619. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: UDP link remote: [AF_INET]141.98.255.83:1300
  620. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: TLS: Initial packet from [AF_INET]141.98.255.83:1300, sid=0d9b9fcc 7f9308c2
  621. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
  622. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v2, emailAddress=security@mullvad.net
  623. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
  624. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
  625. Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: [se-mma-013.mullvad.net] Peer Connection Initiated with [AF_INET]141.98.255.83:1300
  626. Jul 6 16:16:20 DD-WRT daemon.notice openvpn[1061]: SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
  627. Jul 6 16:16:25 DD-WRT daemon.notice openvpn[1061]: SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
  628. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.14.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.14.0.1,
  629. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
  630. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
  631. Jul 6 16:16:26 DD-WRT daemon.warn openvpn[1061]: NOTE: setsockopt TCP_NODELAY=1 failed
  632. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: --ifconfig/up options modified
  633. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route options modified
  634. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route-related options modified
  635. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
  636. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: 4 variation(s) on previous 3 message(s) suppressed by --mute
  637. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Data Channel: using negotiated cipher 'AES-256-GCM'
  638. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  639. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  640. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  641. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Preserving previous TUN/TAP instance: tun1
  642. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
  643. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: /tmp/openvpncl/route-down.sh tun1 1500 1553 10.14.0.7 255.255.0.0 init
  644. Jul 6 16:16:26 DD-WRT daemon.err openvpn[1061]: WARNING: Failed running command (--up/--down): external program exited with error status: 255
  645. Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Exiting due to fatal error
RAW Paste Data