Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Firmware: DD-WRT v3.0-r43652 std (07/03/20)
- Client: CONNECTED SUCCESS Local Address: 10.14.0.7
- Remote Address: 10.14.0.7
- Status
- VPN Client Stats
- TUN/TAP read bytes 152
- TUN/TAP write bytes 0
- TCP/UDP read bytes 5288
- TCP/UDP write bytes 1205
- Auth read bytes 16
- pre-compress bytes 0
- post-compress bytes 0
- pre-decompress bytes 0
- post-decompress bytes 0
- Log
- Clientlog:
- 19691231 18:00:18 W WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
- 19691231 18:00:18 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
- 19691231 18:00:18 Current Parameter Settings:
- 19691231 18:00:18 config = '/tmp/openvpncl/openvpn.conf'
- 19691231 18:00:18 mode = 0
- 19691231 18:00:18 NOTE: --mute triggered...
- 19691231 18:00:18 227 variation(s) on previous 3 message(s) suppressed by --mute
- 19691231 18:00:18 I OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 3 2020
- 19691231 18:00:18 I library versions: OpenSSL 1.1.1g 21 Apr 2020 LZO 2.09
- 19691231 18:00:18 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
- 19691231 18:00:18 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- 19691231 18:00:18 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 19691231 18:00:18 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
- 19691231 18:00:18 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- 19691231 18:00:18 Local Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-client'
- 19691231 18:00:18 Expected Remote Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-server'
- 19691231 18:00:18 I TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
- 19691231 18:00:18 Socket Buffers: R=[180224->180224] S=[180224->180224]
- 19691231 18:00:18 W --mtu-disc is not supported on this OS
- 19691231 18:00:18 I UDP link local: (not bound)
- 19691231 18:00:18 I UDP link remote: [AF_INET]141.98.255.83:1300
- 19691231 18:00:18 TLS: Initial packet from [AF_INET]141.98.255.83:1300 sid=2b7fbbc3 db62db6a
- 19691231 18:00:18 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 19691231 18:00:18 N VERIFY ERROR: depth=2 error=certificate is not yet valid: C=SE ST=Gotaland L=Gothenburg O=Amagicom AB OU=Mullvad CN=Mullvad Root CA v2 emailAddress=security@mullvad.net
- 19691231 18:00:18 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
- 19691231 18:00:18 N TLS_ERROR: BIO read tls_read_plaintext error
- 19691231 18:00:18 NOTE: --mute triggered...
- 19691231 18:00:18 2 variation(s) on previous 3 message(s) suppressed by --mute
- 19691231 18:00:18 TCP/UDP: Closing socket
- 19691231 18:00:18 I SIGUSR1[soft tls-error] received process restarting
- 19691231 18:00:18 Restart pause 5 second(s)
- 20200706 16:12:18 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- 20200706 16:12:18 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 20200706 16:12:18 Re-using SSL/TLS context
- 20200706 16:12:18 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
- 20200706 16:12:18 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- 20200706 16:12:18 Local Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-client'
- 20200706 16:12:18 Expected Remote Options String (VER=V4): 'V4 dev-type tun link-mtu 1558 tun-mtu 1500 proto UDPv4 comp-lzo cipher AES-256-CBC auth SHA1 keysize 256 key-method 2 tls-server'
- 20200706 16:12:18 I TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
- 20200706 16:12:18 Socket Buffers: R=[180224->180224] S=[180224->180224]
- 20200706 16:12:18 W --mtu-disc is not supported on this OS
- 20200706 16:12:18 I UDP link local: (not bound)
- 20200706 16:12:18 I UDP link remote: [AF_INET]141.98.255.83:1300
- 20200706 16:12:18 TLS: Initial packet from [AF_INET]141.98.255.83:1300 sid=ee152f9e 5150a117
- 20200706 16:12:18 VERIFY OK: depth=2 C=SE ST=Gotaland L=Gothenburg O=Amagicom AB OU=Mullvad CN=Mullvad Root CA v2 emailAddress=security@mullvad.net
- 20200706 16:12:18 VERIFY OK: depth=1 C=SE ST=Gotaland O=Amagicom AB OU=Mullvad CN=Mullvad Intermediate CA v2 emailAddress=security@mullvad.net
- 20200706 16:12:18 NOTE: --mute triggered...
- 20200706 16:12:18 2 variation(s) on previous 3 message(s) suppressed by --mute
- 20200706 16:12:18 I [se-mma-013.mullvad.net] Peer Connection Initiated with [AF_INET]141.98.255.83:1300
- 20200706 16:12:19 SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
- 20200706 16:12:20 PUSH: Received control message: 'PUSH_REPLY dhcp-option DNS 10.14.0.1 redirect-gateway def1 bypass-dhcp route-ipv6 0000::/2 route-ipv6 4000::/2 route-ipv6 8000::/2 route-ipv6 C000::/2 comp-lzo no route-gateway 10.14.0.1 topology subnet socket-flags TCP_NODELAY ifconfig-ipv6 fdda:d0d0:cafe:1300::1005/64 fdda:d0d0:cafe:1300:: ifconfig 10.14.0.7 255.255.0.0 peer-id 17 cipher AES-256-GCM'
- 20200706 16:12:20 OPTIONS IMPORT: compression parms modified
- 20200706 16:12:20 NOTE: --mute triggered...
- 20200706 16:12:20 1 variation(s) on previous 3 message(s) suppressed by --mute
- 20200706 16:12:20 W NOTE: setsockopt TCP_NODELAY=1 failed
- 20200706 16:12:20 OPTIONS IMPORT: --ifconfig/up options modified
- 20200706 16:12:20 OPTIONS IMPORT: route options modified
- 20200706 16:12:20 OPTIONS IMPORT: route-related options modified
- 20200706 16:12:20 NOTE: --mute triggered...
- 20200706 16:12:20 4 variation(s) on previous 3 message(s) suppressed by --mute
- 20200706 16:12:20 Data Channel: using negotiated cipher 'AES-256-GCM'
- 20200706 16:12:20 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- 20200706 16:12:20 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 20200706 16:12:20 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 20200706 16:12:20 GDG6: remote_host_ipv6=n/a
- 20200706 16:12:20 I TUN/TAP device tun1 opened
- 20200706 16:12:20 TUN/TAP TX queue length set to 100
- 20200706 16:12:20 do_ifconfig tt->did_ifconfig_ipv6_setup=1
- 20200706 16:12:20 I /sbin/ifconfig tun1 10.14.0.7 netmask 255.255.0.0 mtu 1500 broadcast 10.14.255.255
- 20200706 16:12:20 I /sbin/ifconfig tun1 add fdda:d0d0:cafe:1300::1005/64
- 20200706 16:12:20 /sbin/route add -net 141.98.255.83 netmask 255.255.255.255 gw 192.168.1.1
- 20200706 16:12:20 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
- 20200706 16:12:20 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
- 20200706 16:12:20 I add_route_ipv6(::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- 20200706 16:12:20 /sbin/route -A inet6 add ::/2 dev tun1
- 20200706 16:12:20 I add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- 20200706 16:12:20 /sbin/route -A inet6 add 4000::/2 dev tun1
- 20200706 16:12:20 I add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- 20200706 16:12:20 /sbin/route -A inet6 add 8000::/2 dev tun1
- 20200706 16:12:20 I add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- 20200706 16:12:20 /sbin/route -A inet6 add c000::/2 dev tun1
- 20200706 16:12:20 I Initialization Sequence Completed
- 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- 20200706 16:12:33 D MANAGEMENT: CMD 'state'
- 20200706 16:12:33 MANAGEMENT: Client disconnected
- 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- 20200706 16:12:33 D MANAGEMENT: CMD 'state'
- 20200706 16:12:33 MANAGEMENT: Client disconnected
- 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- 20200706 16:12:33 D MANAGEMENT: CMD 'state'
- 20200706 16:12:33 MANAGEMENT: Client disconnected
- 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- 20200706 16:12:33 D MANAGEMENT: CMD 'status 2'
- 20200706 16:12:33 MANAGEMENT: Client disconnected
- 20200706 16:12:33 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- 20200706 16:12:33 D MANAGEMENT: CMD 'log 500'
- 19691231 18:00:00
- root@DD-WRT:~# ip route show
- 0.0.0.0/1 via 10.14.0.1 dev tun1
- default via 192.168.1.1 dev br0
- 10.14.0.0/16 dev tun1 scope link src 10.14.0.7
- 127.0.0.0/8 dev lo scope link
- 128.0.0.0/1 via 10.14.0.1 dev tun1
- 141.98.255.83 via 192.168.1.1 dev br0
- 192.168.1.0/24 dev br0 scope link src 192.168.1.3
- 192.168.1.0/24 dev vlan2 scope link src 192.168.1.2
- root@DD-WRT:~# ip a
- 1: lo: <LOOPBACK,MULTICAST,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1
- link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
- valid_lft forever preferred_lft forever
- inet6 ::1/128 scope host
- valid_lft forever preferred_lft forever
- 2: teql0: <NOARP> mtu 1500 qdisc noop state DOWN qlen 100
- link/void
- 3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq state UNKNOWN qlen 1000
- link/ether d4:6e:0e:42:8d:fc brd ff:ff:ff:ff:ff:ff
- inet6 fe80::d66e:eff:fe42:8dfc/64 scope link
- valid_lft forever preferred_lft forever
- 4: vlan1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br0 state UP qlen 1000
- link/ether d4:6e:0e:42:8d:fc brd ff:ff:ff:ff:ff:ff
- inet6 fe80::d66e:eff:fe42:8dfc/64 scope link
- valid_lft forever preferred_lft forever
- 5: vlan2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
- link/ether d4:6e:0e:42:8d:fd brd ff:ff:ff:ff:ff:ff
- inet 192.168.1.2/24 brd 192.168.1.255 scope global vlan2
- valid_lft forever preferred_lft forever
- inet6 fe80::d66e:eff:fe42:8dfd/64 scope link
- valid_lft forever preferred_lft forever
- 6: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq master br0 state UNKNOWN qlen 1000
- link/ether d4:6e:0e:42:8d:fe brd ff:ff:ff:ff:ff:ff
- inet6 fe80::d66e:eff:fe42:8dfe/64 scope link
- valid_lft forever preferred_lft forever
- 7: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc sfq master br0 state UNKNOWN qlen 1000
- link/ether d4:6e:0e:42:8d:0a brd ff:ff:ff:ff:ff:ff
- inet6 fe80::d66e:eff:fe42:8d0a/64 scope link
- valid_lft forever preferred_lft forever
- 8: sit0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN qlen 1
- link/sit 0.0.0.0 brd 0.0.0.0
- 9: ip6tnl0@NONE: <NOARP> mtu 1452 qdisc noop state DOWN qlen 1
- link/tunnel6 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 brd 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
- 10: br0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
- link/ether d4:6e:0e:42:8d:fe brd ff:ff:ff:ff:ff:ff
- inet 192.168.1.3/24 brd 192.168.1.255 scope global br0
- valid_lft forever preferred_lft forever
- inet6 fe80::d66e:eff:fe42:8dfe/64 scope link
- valid_lft forever preferred_lft forever
- 11: tun1: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc sfq state UNKNOWN qlen 100
- link/[65534]
- inet 10.14.0.7/16 brd 10.14.255.255 scope global tun1
- valid_lft forever preferred_lft forever
- inet6 fdda:d0d0:cafe:1300::1005/64 scope global
- valid_lft forever preferred_lft forever
- root@DD-WRT:~# iptables -L
- Chain INPUT (policy ACCEPT)
- target prot opt source destination
- ACCEPT 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere state RELATED,ESTABLISHED
- DROP udp -- anywhere anywhere udp dpt:route
- DROP udp -- anywhere anywhere udp dpt:route
- ACCEPT udp -- anywhere anywhere udp dpt:route
- ACCEPT ipv6 -- anywhere anywhere
- DROP icmp -- anywhere anywhere
- DROP igmp -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere state NEW
- ACCEPT 0 -- anywhere anywhere state NEW
- DROP 0 -- anywhere anywhere
- Chain FORWARD (policy ACCEPT)
- target prot opt source destination
- ACCEPT 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere state RELATED,ESTABLISHED
- ACCEPT gre -- 192.168.1.0/24 anywhere
- ACCEPT tcp -- 192.168.1.0/24 anywhere tcp dpt:1723
- lan2wan 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere
- TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
- trigger_out 0 -- anywhere anywhere
- TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
- trigger_out 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere state NEW
- TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
- trigger_out 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere state NEW
- TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
- trigger_out 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere state NEW
- TRIGGER 0 -- anywhere anywhere TRIGGER type:in match:0 relate:0
- trigger_out 0 -- anywhere anywhere
- ACCEPT 0 -- anywhere anywhere state NEW
- ACCEPT 0 -- anywhere anywhere state NEW
- DROP 0 -- anywhere anywhere
- Chain OUTPUT (policy ACCEPT)
- target prot opt source destination
- Chain advgrp_1 (0 references)
- target prot opt source destination
- Chain advgrp_10 (0 references)
- target prot opt source destination
- Chain advgrp_11 (0 references)
- target prot opt source destination
- Chain advgrp_12 (0 references)
- target prot opt source destination
- Chain advgrp_13 (0 references)
- target prot opt source destination
- Chain advgrp_14 (0 references)
- target prot opt source destination
- Chain advgrp_15 (0 references)
- target prot opt source destination
- Chain advgrp_16 (0 references)
- target prot opt source destination
- Chain advgrp_17 (0 references)
- target prot opt source destination
- Chain advgrp_18 (0 references)
- target prot opt source destination
- Chain advgrp_19 (0 references)
- target prot opt source destination
- Chain advgrp_2 (0 references)
- target prot opt source destination
- Chain advgrp_20 (0 references)
- target prot opt source destination
- Chain advgrp_3 (0 references)
- target prot opt source destination
- Chain advgrp_4 (0 references)
- target prot opt source destination
- Chain advgrp_5 (0 references)
- target prot opt source destination
- Chain advgrp_6 (0 references)
- target prot opt source destination
- Chain advgrp_7 (0 references)
- target prot opt source destination
- Chain advgrp_8 (0 references)
- target prot opt source destination
- Chain advgrp_9 (0 references)
- target prot opt source destination
- Chain grp_1 (0 references)
- target prot opt source destination
- Chain grp_10 (0 references)
- target prot opt source destination
- Chain grp_11 (0 references)
- target prot opt source destination
- Chain grp_12 (0 references)
- target prot opt source destination
- Chain grp_13 (0 references)
- target prot opt source destination
- Chain grp_14 (0 references)
- target prot opt source destination
- Chain grp_15 (0 references)
- target prot opt source destination
- Chain grp_16 (0 references)
- target prot opt source destination
- Chain grp_17 (0 references)
- target prot opt source destination
- Chain grp_18 (0 references)
- target prot opt source destination
- Chain grp_19 (0 references)
- target prot opt source destination
- Chain grp_2 (0 references)
- target prot opt source destination
- Chain grp_20 (0 references)
- target prot opt source destination
- Chain grp_3 (0 references)
- target prot opt source destination
- Chain grp_4 (0 references)
- target prot opt source destination
- Chain grp_5 (0 references)
- target prot opt source destination
- Chain grp_6 (0 references)
- target prot opt source destination
- Chain grp_7 (0 references)
- target prot opt source destination
- Chain grp_8 (0 references)
- target prot opt source destination
- Chain grp_9 (0 references)
- target prot opt source destination
- Chain lan2wan (1 references)
- target prot opt source destination
- Chain logaccept (0 references)
- target prot opt source destination
- ACCEPT 0 -- anywhere anywhere
- Chain logdrop (0 references)
- target prot opt source destination
- LOG 0 -- anywhere anywhere state INVALID LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
- DROP 0 -- anywhere anywhere
- Chain logreject (0 references)
- target prot opt source destination
- REJECT tcp -- anywhere anywhere reject-with tcp-reset
- Chain trigger_out (5 references)
- target prot opt source destination
- Dec 31 18:00:07 DD-WRT syslog.info syslogd started: BusyBox v1.31.1
- Dec 31 18:00:07 DD-WRT user.info : ipv6 : successfully started
- Dec 31 18:00:07 DD-WRT user.info : resetbutton : resetbutton daemon successfully started
- Dec 31 18:00:08 DD-WRT user.info : bridge : bridge br0 successfully added
- Dec 31 18:00:08 DD-WRT daemon.info mstpd[615]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 10
- Dec 31 18:00:08 DD-WRT daemon.info mstpd[615]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 10
- Dec 31 18:00:08 DD-WRT user.info : bridge : interface vlan1 successfully added to bridge br0
- Dec 31 18:00:08 DD-WRT user.info : bridge : interface eth1 successfully added to bridge br0
- Dec 31 18:00:14 DD-WRT user.info : bridge : interface eth2 successfully added to bridge br0
- Dec 31 18:00:14 DD-WRT user.info : wland : daemon successfully started
- Dec 31 18:00:14 DD-WRT user.info : telnetd : daemon successfully started
- Dec 31 18:00:15 DD-WRT user.info : syslogd : syslog daemon successfully stopped
- Dec 31 18:00:15 DD-WRT syslog.info syslogd exiting
- Dec 31 18:00:15 DD-WRT syslog.info syslogd started: BusyBox v1.31.1
- Dec 31 18:00:15 DD-WRT daemon.info radvd[839]: version 2.18 started
- Dec 31 18:00:15 DD-WRT user.info : radvd : RADVD daemon successfully started
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: started, version 2.81 cachesize 1500
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect no-inotify no-dumpfile
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq-dhcp[863]: DHCP, IP range 192.168.1.10 -- 192.168.1.59, lease time 1d
- Dec 31 18:00:15 DD-WRT user.info : dnsmasq : daemon successfully started
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain test
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain onion
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain localhost
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain local
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain invalid
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain bind
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: reading /tmp/resolv.dnsmasq
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain test
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain onion
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain localhost
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain local
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain invalid
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using only locally-known addresses for domain bind
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using nameserver 1.1.1.1#53
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using nameserver 10.8.0.1#53
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: using nameserver 193.138.218.74#53
- Dec 31 18:00:15 DD-WRT daemon.info dnsmasq[863]: read /etc/hosts - 2 addresses
- Dec 31 18:00:15 DD-WRT user.info : cron : daemon successfully started
- Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: mode = 0
- Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: NOTE: --mute triggered...
- Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: 227 variation(s) on previous 3 message(s) suppressed by --mute
- Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 3 2020
- Dec 31 18:00:16 DD-WRT daemon.notice openvpn[876]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.09
- Dec 31 18:00:16 DD-WRT daemon.notice openvpn[935]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
- Dec 31 18:00:16 DD-WRT daemon.warn openvpn[935]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Dec 31 18:00:16 DD-WRT daemon.warn openvpn[935]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Dec 31 18:00:16 DD-WRT user.info : dnsmasq : daemon successfully stopped
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[863]: exiting on receipt of SIGTERM
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: started, version 2.81 cachesize 1500
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect no-inotify no-dumpfile
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq-dhcp[1033]: DHCP, IP range 192.168.1.10 -- 192.168.1.59, lease time 1d
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain test
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain onion
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain localhost
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain local
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain invalid
- Dec 31 18:00:16 DD-WRT user.info : dnsmasq : daemon successfully started
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain bind
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: reading /tmp/resolv.dnsmasq
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain test
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain onion
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain localhost
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain local
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain invalid
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain bind
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using nameserver 1.1.1.1#53
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using nameserver 10.8.0.1#53
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: using nameserver 193.138.218.74#53
- Dec 31 18:00:16 DD-WRT daemon.info dnsmasq[1033]: read /etc/hosts - 2 addresses
- Dec 31 18:00:16 DD-WRT user.info : wland : daemon successfully stopped
- Dec 31 18:00:16 DD-WRT user.info : wland : daemon successfully started
- Dec 31 18:00:16 DD-WRT user.info : wan : WAN is up. IP: 192.168.1.2
- Dec 31 18:00:16 DD-WRT user.info : openvpn : OpenVPN daemon (Client) successfully stopped
- Dec 31 18:00:16 DD-WRT daemon.info httpd[1043]: httpd : httpd server started at port 80
- Dec 31 18:00:16 DD-WRT user.info : httpd : http daemon successfully started
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[935]: SIGTERM[hard,init_instance] received, process exiting
- Dec 31 18:00:18 DD-WRT user.info : dropbear : ssh daemon successfully started
- Dec 31 18:00:18 DD-WRT authpriv.info dropbear[1048]: Running in background
- Dec 31 18:00:18 DD-WRT user.info : openvpn : OpenVPN daemon (Client) starting/restarting...
- Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1059]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
- Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1059]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: Current Parameter Settings:
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: config = '/tmp/openvpncl/openvpn.conf'
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: mode = 0
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: NOTE: --mute triggered...
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: 227 variation(s) on previous 3 message(s) suppressed by --mute
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: OpenVPN 2.4.9 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 3 2020
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1059]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.09
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
- Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Socket Buffers: R=[180224->180224] S=[180224->180224]
- Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: --mtu-disc is not supported on this OS
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: UDP link local: (not bound)
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: UDP link remote: [AF_INET]141.98.255.83:1300
- Dec 31 18:00:18 DD-WRT user.info : radvd : daemon successfully stopped
- Dec 31 18:00:18 DD-WRT daemon.warn radvd[860]: exiting, 1 sigterm(s) received
- Dec 31 18:00:18 DD-WRT daemon.info radvd[860]: sending stop adverts
- Dec 31 18:00:18 DD-WRT daemon.info radvd[860]: removing /var/run/radvd.pid
- Dec 31 18:00:18 DD-WRT daemon.info radvd[860]: returning from radvd main
- Dec 31 18:00:18 DD-WRT daemon.info radvd[1062]: version 2.18 started
- Dec 31 18:00:18 DD-WRT user.info : radvd : RADVD daemon successfully started
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: TLS: Initial packet from [AF_INET]141.98.255.83:1300, sid=2b7fbbc3 db62db6a
- Dec 31 18:00:18 DD-WRT daemon.warn openvpn[1061]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Dec 31 18:00:18 DD-WRT daemon.err openvpn[1061]: VERIFY ERROR: depth=2, error=certificate is not yet valid: C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
- Dec 31 18:00:18 DD-WRT daemon.err openvpn[1061]: OpenSSL: error:1416F086:lib(20):func(367):reason(134)
- Dec 31 18:00:18 DD-WRT daemon.err openvpn[1061]: TLS_ERROR: BIO read tls_read_plaintext error
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Closing socket
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: SIGUSR1[soft,tls-error] received, process restarting
- Dec 31 18:00:18 DD-WRT daemon.notice openvpn[1061]: Restart pause, 5 second(s)
- Dec 31 18:00:18 DD-WRT user.info : vpn modules : vpn modules successfully unloaded
- Dec 31 18:00:18 DD-WRT user.info : vpn modules : nf_conntrack_proto_gre successfully loaded
- Dec 31 18:00:18 DD-WRT user.info : vpn modules : nf_nat_proto_gre successfully loaded
- Dec 31 18:00:18 DD-WRT user.info : vpn modules : nf_conntrack_pptp successfully loaded
- Dec 31 18:00:19 DD-WRT user.info : vpn modules : nf_nat_pptp successfully loaded
- Dec 31 18:00:19 DD-WRT user.info : sfe : shortcut forwarding engine successfully started
- Dec 31 18:00:19 DD-WRT user.info : process_monitor : successfully started
- Dec 31 18:00:19 DD-WRT user.info : ttraff : traffic counter daemon successfully started
- Dec 31 18:00:19 DD-WRT daemon.debug ntpclient[1215]: Connecting to 2.pool.ntp.org [193.109.84.119] ...
- Jul 6 16:12:17 DD-WRT daemon.info ntpclient[1215]: Time set from 2.pool.ntp.org [193.109.84.119].
- Jul 6 16:12:17 DD-WRT daemon.info process_monitor[1214]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
- Jul 6 16:12:17 DD-WRT daemon.debug process_monitor[1214]: Restarting cron (time sync change)
- Jul 6 16:12:17 DD-WRT user.info : cron : daemon successfully stopped
- Jul 6 16:12:17 DD-WRT user.info : cron : daemon successfully started
- Jul 6 16:12:17 DD-WRT cron.info cron[1329]: (CRON) STARTUP (fork ok)
- Jul 6 16:12:17 DD-WRT user.info : process_monitor : daemon successfully stopped
- Jul 6 16:12:17 DD-WRT daemon.info process_monitor[1214]: process_monitor : cleanup timers
- Jul 6 16:12:18 DD-WRT daemon.warn openvpn[1061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Jul 6 16:12:18 DD-WRT daemon.warn openvpn[1061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Re-using SSL/TLS context
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: Socket Buffers: R=[180224->180224] S=[180224->180224]
- Jul 6 16:12:18 DD-WRT daemon.warn openvpn[1061]: --mtu-disc is not supported on this OS
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: UDP link local: (not bound)
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: UDP link remote: [AF_INET]141.98.255.83:1300
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: TLS: Initial packet from [AF_INET]141.98.255.83:1300, sid=ee152f9e 5150a117
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v2, emailAddress=security@mullvad.net
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
- Jul 6 16:12:18 DD-WRT daemon.notice openvpn[1061]: [se-mma-013.mullvad.net] Peer Connection Initiated with [AF_INET]141.98.255.83:1300
- Jul 6 16:12:18 DD-WRT authpriv.info dropbear[1337]: Child connection from 192.168.1.4:54476
- Jul 6 16:12:19 DD-WRT daemon.notice openvpn[1061]: SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.14.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.14.0.1,
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: compression parms modified
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: 1 variation(s) on previous 3 message(s) suppressed by --mute
- Jul 6 16:12:20 DD-WRT daemon.warn openvpn[1061]: NOTE: setsockopt TCP_NODELAY=1 failed
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: --ifconfig/up options modified
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route options modified
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route-related options modified
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: 4 variation(s) on previous 3 message(s) suppressed by --mute
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Data Channel: using negotiated cipher 'AES-256-GCM'
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: GDG6: remote_host_ipv6=n/a
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: TUN/TAP device tun1 opened
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: TUN/TAP TX queue length set to 100
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: do_ifconfig, tt->did_ifconfig_ipv6_setup=1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/ifconfig tun1 10.14.0.7 netmask 255.255.0.0 mtu 1500 broadcast 10.14.255.255
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/ifconfig tun1 add fdda:d0d0:cafe:1300::1005/64
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route add -net 141.98.255.83 netmask 255.255.255.255 gw 192.168.1.1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.14.0.1
- Jul 6 16:12:20 DD-WRT user.info : process_monitor : daemon hanging, send SIGKILL
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add ::/2 dev tun1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add 4000::/2 dev tun1
- Jul 6 16:12:20 DD-WRT user.info : process_monitor : successfully started
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add 8000::/2 dev tun1
- Jul 6 16:12:20 DD-WRT daemon.debug process_monitor[1346]: We need to re-update after 3600 seconds
- Jul 6 16:12:20 DD-WRT daemon.info process_monitor[1346]: process_monitor : set timer: 3600 seconds, callback: ntp_main()
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:1300:: metric -1) dev tun1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: /sbin/route -A inet6 add c000::/2 dev tun1
- Jul 6 16:12:20 DD-WRT daemon.notice openvpn[1061]: Initialization Sequence Completed
- Jul 6 16:12:23 DD-WRT authpriv.notice dropbear[1337]: Password auth succeeded for 'root' from 192.168.1.4:54476
- Jul 6 16:12:24 DD-WRT user.info : nas : wait for network init
- Jul 6 16:12:32 DD-WRT user.debug : ttraff: data collection started
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'state'
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'state'
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'state'
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'status 2'
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: CMD 'log 500'
- Jul 6 16:12:33 DD-WRT daemon.notice openvpn[1061]: MANAGEMENT: Client disconnected
- Jul 6 16:12:34 DD-WRT user.info : nas : start nas lan
- Jul 6 16:12:34 DD-WRT user.info : nas : start nas for wl0
- Jul 6 16:12:34 DD-WRT user.info : nas : NAS lan (wl0 interface) successfully started
- Jul 6 16:12:34 DD-WRT user.info : nas : start nas lan
- Jul 6 16:12:34 DD-WRT user.info : nas : start nas for wl1
- Jul 6 16:12:34 DD-WRT user.info : nas : NAS lan (wl1 interface) successfully started
- Jul 6 16:12:35 DD-WRT user.info : nas : daemon successfully stopped
- Jul 6 16:12:37 DD-WRT user.info : nas : daemon hanging, send SIGKILL
- Jul 6 16:12:37 DD-WRT user.info : nas : start nas lan
- Jul 6 16:12:37 DD-WRT user.info : nas : start nas for wl0
- Jul 6 16:12:37 DD-WRT user.info : nas : NAS lan (wl0 interface) successfully started
- Jul 6 16:12:37 DD-WRT user.info : nas : start nas lan
- Jul 6 16:12:37 DD-WRT user.info : nas : start nas for wl1
- Jul 6 16:12:37 DD-WRT user.info : nas : NAS lan (wl1 interface) successfully started
- Jul 6 16:12:37 DD-WRT user.info : httpd : daemon successfully stopped
- Jul 6 16:12:37 DD-WRT daemon.info httpd[1045]: httpd : httpd server shutdown
- Jul 6 16:12:37 DD-WRT daemon.info httpd[1471]: httpd : httpd server started at port 80
- Jul 6 16:12:37 DD-WRT user.info : httpd : http daemon successfully started
- Jul 6 16:12:37 DD-WRT user.info : resetbutton : daemon successfully stopped
- Jul 6 16:12:37 DD-WRT user.info : resetbutton : resetbutton daemon successfully started
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: reading /tmp/resolv.dnsmasq
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain test
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain onion
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain localhost
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain local
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain invalid
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using only locally-known addresses for domain bind
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 10.14.0.1#53
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 1.1.1.1#53
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 10.8.0.1#53
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq[1033]: using nameserver 193.138.218.74#53
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq-dhcp[1033]: DHCPREQUEST(br0) 192.168.1.19 88:29:9c:d9:66:4d
- Jul 6 16:14:43 DD-WRT daemon.info dnsmasq-dhcp[1033]: DHCPACK(br0) 192.168.1.19 88:29:9c:d9:66:4d Galaxy-Tab-A
- Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: [se-mma-013.mullvad.net] Inactivity timeout (--ping-restart), restarting
- Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Closing socket
- Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: SIGUSR1[soft,ping-restart] received, process restarting
- Jul 6 16:16:14 DD-WRT daemon.notice openvpn[1061]: Restart pause, 5 second(s)
- Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Re-using SSL/TLS context
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.255.83:1300
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: Socket Buffers: R=[180224->180224] S=[180224->180224]
- Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: NOTE: setsockopt TCP_NODELAY=1 failed
- Jul 6 16:16:19 DD-WRT daemon.warn openvpn[1061]: --mtu-disc is not supported on this OS
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: UDP link local: (not bound)
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: UDP link remote: [AF_INET]141.98.255.83:1300
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: TLS: Initial packet from [AF_INET]141.98.255.83:1300, sid=0d9b9fcc 7f9308c2
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v2, emailAddress=security@mullvad.net
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
- Jul 6 16:16:19 DD-WRT daemon.notice openvpn[1061]: [se-mma-013.mullvad.net] Peer Connection Initiated with [AF_INET]141.98.255.83:1300
- Jul 6 16:16:20 DD-WRT daemon.notice openvpn[1061]: SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
- Jul 6 16:16:25 DD-WRT daemon.notice openvpn[1061]: SENT CONTROL [se-mma-013.mullvad.net]: 'PUSH_REQUEST' (status=1)
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.14.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.14.0.1,
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: 2 variation(s) on previous 3 message(s) suppressed by --mute
- Jul 6 16:16:26 DD-WRT daemon.warn openvpn[1061]: NOTE: setsockopt TCP_NODELAY=1 failed
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: --ifconfig/up options modified
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route options modified
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: OPTIONS IMPORT: route-related options modified
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: NOTE: --mute triggered...
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: 4 variation(s) on previous 3 message(s) suppressed by --mute
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Data Channel: using negotiated cipher 'AES-256-GCM'
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Preserving previous TUN/TAP instance: tun1
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: /tmp/openvpncl/route-down.sh tun1 1500 1553 10.14.0.7 255.255.0.0 init
- Jul 6 16:16:26 DD-WRT daemon.err openvpn[1061]: WARNING: Failed running command (--up/--down): external program exited with error status: 255
- Jul 6 16:16:26 DD-WRT daemon.notice openvpn[1061]: Exiting due to fatal error
RAW Paste Data