Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can't Contact Server Admin Script #1785

Closed
ccmks opened this issue Apr 26, 2021 · 21 comments
Closed

Can't Contact Server Admin Script #1785

ccmks opened this issue Apr 26, 2021 · 21 comments

Comments

@ccmks
Copy link

ccmks commented Apr 26, 2021

Expected Behavior

Everything is working with all green check instead of yellow exclamation mark on OMR Status page

Current Behavior

image

Possible Solution

No idea

Steps to Reproduce the Problem

It was working fine for several days until we get this for no apparent reason!

Context (Environment)

N/A

Specifications

  • OpenMPTCProuter version: penmptcprouter v0.57.3 r0+15225-bfc433efd4
  • OpenMPTCProuter VPS version: 0.1024 5.4.86-MPTCP
  • OpenMPTCProuter platform: x86_64 Hyper-V
@ccmks ccmks added the bug label Apr 26, 2021
@Ysurac
Copy link
Owner

Ysurac commented Apr 26, 2021

What is this 27.112.xxx IP from ?
Check in State->System log why it can't contact VPS API.

@ccmks
Copy link
Author

ccmks commented Apr 26, 2021

What is this 27.112.xxx IP from ? - Indonesian VPS

It is working now by itself so I am not sure what happened. But I do know that it is happening intermittently. At least it has been doing it 3 times a week, so not sure if go to system log will be relevant?

@Ysurac
Copy link
Owner

Ysurac commented Apr 26, 2021

Yes you should check in system log if a VPS problem is detected when there is the problem.
Possible that the latency between connections and VPS is sometimes too high or some packets lost.

@ccmks
Copy link
Author

ccmks commented Apr 26, 2021

Here is the system log:

Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:08:34 2021 daemon.warn openvpn(wan3)[7347]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:08:34 2021 daemon.warn openvpn(wan3)[7347]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:08:34 2021 daemon.err openvpn(wan3)[7347]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:08:34 2021 daemon.notice openvpn(wan3)[7347]: Exiting due to fatal error
Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:08:39 2021 daemon.warn openvpn(wan3)[7967]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:08:39 2021 daemon.err openvpn(wan3)[7967]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:08:39 2021 daemon.notice openvpn(wan3)[7967]: Exiting due to fatal error
Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:08:44 2021 daemon.warn openvpn(wan3)[9275]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:08:44 2021 daemon.err openvpn(wan3)[9275]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:08:44 2021 daemon.notice openvpn(wan3)[9275]: Exiting due to fatal error
Mon Apr 26 21:08:45 2021 user.notice omr-bypass: Starting OMR-ByPass...
Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:08:49 2021 daemon.warn openvpn(wan3)[10927]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:08:49 2021 daemon.err openvpn(wan3)[10927]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:08:49 2021 daemon.notice openvpn(wan3)[10927]: Exiting due to fatal error
Mon Apr 26 21:08:49 2021 user.notice omr-bypass: Restart dnsmasq...
Mon Apr 26 21:08:49 2021 daemon.info dnsmasq[4254]: exiting on receipt of SIGTERM
Mon Apr 26 21:08:49 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Mon Apr 26 21:08:49 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Mon Apr 26 21:08:49 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: started, version 2.82 cachesize 150
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: DNS service limited to local subnets
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq-dhcp[11039]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain test
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain onion
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain localhost
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain local
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain invalid
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain bind
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain use-application-dns.net
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using only locally-known addresses for domain lan
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using nameserver 127.0.0.1#5353
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: using 1 more local addresses
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: read /etc/hosts - 4 addresses
Mon Apr 26 21:08:50 2021 user.notice omr-bypass: OMR-ByPass is running
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq[11039]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Mon Apr 26 21:08:50 2021 daemon.info dnsmasq-dhcp[11039]: read /etc/ethers - 0 addresses
Mon Apr 26 21:08:51 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Mon Apr 26 21:08:52 2021 user.notice omr-tracker: Launching...
Mon Apr 26 21:08:52 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:08:52 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:08:54 2021 daemon.warn openvpn(wan3)[12444]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:08:54 2021 daemon.err openvpn(wan3)[12444]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:08:54 2021 daemon.notice openvpn(wan3)[12444]: Exiting due to fatal error
Mon Apr 26 21:08:54 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:08:55 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:08:55 2021 daemon.warn openvpn(wan3)[12613]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:08:55 2021 daemon.err openvpn(wan3)[12613]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:08:55 2021 daemon.notice openvpn(wan3)[12613]: Exiting due to fatal error
Mon Apr 26 21:08:57 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:08:57 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:08:57 2021 daemon.warn openvpn(wan3)[13026]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:08:57 2021 daemon.err openvpn(wan3)[13026]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:08:57 2021 daemon.notice openvpn(wan3)[13026]: Exiting due to fatal error
Mon Apr 26 21:08:57 2021 user.notice omr-tracker: Launched
Mon Apr 26 21:08:58 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:02 2021 daemon.warn openvpn(wan3)[14672]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:02 2021 daemon.err openvpn(wan3)[14672]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:02 2021 daemon.notice openvpn(wan3)[14672]: Exiting due to fatal error
Mon Apr 26 21:09:03 2021 user.notice omr-tracker: Launching...
Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:07 2021 daemon.warn openvpn(wan3)[15658]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:07 2021 daemon.err openvpn(wan3)[15658]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:07 2021 daemon.notice openvpn(wan3)[15658]: Exiting due to fatal error
Mon Apr 26 21:09:07 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:09:08 2021 user.notice omr-tracker: Launched
Mon Apr 26 21:09:09 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Mon Apr 26 21:09:10 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:09:10 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:10 2021 daemon.warn openvpn(wan3)[17100]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:10 2021 daemon.err openvpn(wan3)[17100]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:10 2021 daemon.notice openvpn(wan3)[17100]: Exiting due to fatal error
Mon Apr 26 21:09:11 2021 user.notice omr-bypass: Starting OMR-ByPass...
Mon Apr 26 21:09:12 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:09:15 2021 user.notice omr-bypass: Restart dnsmasq...
Mon Apr 26 21:09:15 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[11039]: exiting on receipt of SIGTERM
Mon Apr 26 21:09:15 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:09:15 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Mon Apr 26 21:09:15 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Mon Apr 26 21:09:15 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: started, version 2.82 cachesize 150
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: DNS service limited to local subnets
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq-dhcp[19498]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain test
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain onion
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain localhost
Mon Apr 26 21:09:15 2021 user.notice omr-bypass: OMR-ByPass is running
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain local
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain invalid
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain bind
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain use-application-dns.net
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using only locally-known addresses for domain lan
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using nameserver 127.0.0.1#5353
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: using 1 more local addresses
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: read /etc/hosts - 4 addresses
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq[19498]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Mon Apr 26 21:09:15 2021 daemon.info dnsmasq-dhcp[19498]: read /etc/ethers - 0 addresses
Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:15 2021 daemon.warn openvpn(wan3)[19584]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:15 2021 daemon.err openvpn(wan3)[19584]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:15 2021 daemon.notice openvpn(wan3)[19584]: Exiting due to fatal error
Mon Apr 26 21:09:16 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:09:16 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:16 2021 daemon.warn openvpn(wan3)[19858]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:16 2021 daemon.err openvpn(wan3)[19858]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:16 2021 daemon.notice openvpn(wan3)[19858]: Exiting due to fatal error
Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:21 2021 daemon.warn openvpn(wan3)[20792]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:21 2021 daemon.err openvpn(wan3)[20792]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:21 2021 daemon.notice openvpn(wan3)[20792]: Exiting due to fatal error
Mon Apr 26 21:09:22 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:09:22 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:22 2021 daemon.warn openvpn(wan3)[20942]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:22 2021 daemon.err openvpn(wan3)[20942]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:22 2021 daemon.notice openvpn(wan3)[20942]: Exiting due to fatal error
Mon Apr 26 21:09:26 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:09:27 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12)
Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:27 2021 daemon.warn openvpn(wan3)[21527]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:27 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3
Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:27 2021 daemon.err openvpn(wan3)[21527]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:27 2021 daemon.notice openvpn(wan3)[21527]: Exiting due to fatal error
Mon Apr 26 21:09:29 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:09:29 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:29 2021 daemon.warn openvpn(wan3)[22061]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:29 2021 daemon.err openvpn(wan3)[22061]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:29 2021 daemon.notice openvpn(wan3)[22061]: Exiting due to fatal error
Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:34 2021 daemon.warn openvpn(wan3)[22174]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:34 2021 daemon.err openvpn(wan3)[22174]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:34 2021 daemon.notice openvpn(wan3)[22174]: Exiting due to fatal error
Mon Apr 26 21:09:38 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:39 2021 daemon.warn openvpn(wan3)[22931]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:39 2021 daemon.err openvpn(wan3)[22931]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:39 2021 daemon.notice openvpn(wan3)[22931]: Exiting due to fatal error
Mon Apr 26 21:09:41 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:09:41 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:41 2021 daemon.warn openvpn(wan3)[23215]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:41 2021 daemon.err openvpn(wan3)[23215]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:41 2021 daemon.notice openvpn(wan3)[23215]: Exiting due to fatal error
Mon Apr 26 21:09:45 2021 user.notice omr-bypass: Starting OMR-ByPass...
Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:46 2021 daemon.warn openvpn(wan3)[24702]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:46 2021 daemon.err openvpn(wan3)[24702]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:46 2021 daemon.notice openvpn(wan3)[24702]: Exiting due to fatal error
Mon Apr 26 21:09:49 2021 user.notice omr-bypass: Restart dnsmasq...
Mon Apr 26 21:09:49 2021 daemon.info dnsmasq[19498]: exiting on receipt of SIGTERM
Mon Apr 26 21:09:49 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Mon Apr 26 21:09:49 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Mon Apr 26 21:09:49 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: started, version 2.82 cachesize 150
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: DNS service limited to local subnets
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Mon Apr 26 21:09:50 2021 user.notice omr-bypass: OMR-ByPass is running
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq-dhcp[25717]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain test
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain onion
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain localhost
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain local
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain invalid
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain bind
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain use-application-dns.net
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using only locally-known addresses for domain lan
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using nameserver 127.0.0.1#5353
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: using 1 more local addresses
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: read /etc/hosts - 4 addresses
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq[25717]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Mon Apr 26 21:09:50 2021 daemon.info dnsmasq-dhcp[25717]: read /etc/ethers - 0 addresses
Mon Apr 26 21:09:51 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:51 2021 daemon.warn openvpn(wan3)[26638]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:51 2021 daemon.err openvpn(wan3)[26638]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:51 2021 daemon.notice openvpn(wan3)[26638]: Exiting due to fatal error
Mon Apr 26 21:09:52 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:09:52 2021 user.notice omr-tracker: Launching...
Mon Apr 26 21:09:54 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:09:54 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:09:55 2021 daemon.warn openvpn(wan3)[27499]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:09:55 2021 daemon.err openvpn(wan3)[27499]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:09:55 2021 daemon.notice openvpn(wan3)[27499]: Exiting due to fatal error
Mon Apr 26 21:09:57 2021 user.notice omr-tracker: Launched
Mon Apr 26 21:09:59 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Mon Apr 26 21:09:59 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:00 2021 daemon.warn openvpn(wan3)[28396]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:00 2021 daemon.err openvpn(wan3)[28396]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:00 2021 daemon.notice openvpn(wan3)[28396]: Exiting due to fatal error
Mon Apr 26 21:10:03 2021 user.notice omr-tracker: Launching...
Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:05 2021 daemon.warn openvpn(wan3)[29793]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:05 2021 daemon.err openvpn(wan3)[29793]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:05 2021 daemon.notice openvpn(wan3)[29793]: Exiting due to fatal error
Mon Apr 26 21:10:06 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:10:06 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:07 2021 daemon.warn openvpn(wan3)[30039]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:07 2021 daemon.err openvpn(wan3)[30039]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:07 2021 daemon.notice openvpn(wan3)[30039]: Exiting due to fatal error
Mon Apr 26 21:10:08 2021 user.notice omr-tracker: Launched
Mon Apr 26 21:10:09 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Mon Apr 26 21:10:10 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:10:11 2021 user.notice omr-bypass: Starting OMR-ByPass...
Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:12 2021 daemon.warn openvpn(wan3)[32449]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:12 2021 daemon.err openvpn(wan3)[32449]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:12 2021 daemon.notice openvpn(wan3)[32449]: Exiting due to fatal error
Mon Apr 26 21:10:12 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:10:13 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:10:13 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:13 2021 daemon.warn openvpn(wan3)[414]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:13 2021 daemon.err openvpn(wan3)[414]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:13 2021 daemon.notice openvpn(wan3)[414]: Exiting due to fatal error
Mon Apr 26 21:10:14 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:10:15 2021 user.notice post-tracking-post-tracking: Tunnel up : Replace default route by 10.255.255.1 dev tun0
Mon Apr 26 21:10:15 2021 user.notice omr-bypass: Restart dnsmasq...
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[25717]: exiting on receipt of SIGTERM
Mon Apr 26 21:10:15 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Mon Apr 26 21:10:15 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Mon Apr 26 21:10:15 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: started, version 2.82 cachesize 150
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: DNS service limited to local subnets
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq-dhcp[1705]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h
Mon Apr 26 21:10:15 2021 user.notice omr-bypass: OMR-ByPass is running
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain test
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain onion
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain localhost
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain local
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain invalid
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain bind
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain use-application-dns.net
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using only locally-known addresses for domain lan
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using nameserver 127.0.0.1#5353
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: using 1 more local addresses
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: read /etc/hosts - 4 addresses
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq[1705]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Mon Apr 26 21:10:15 2021 daemon.info dnsmasq-dhcp[1705]: read /etc/ethers - 0 addresses
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2519]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:18 2021 daemon.err openvpn(wan3)[2519]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2519]: Exiting due to fatal error
Mon Apr 26 21:10:18 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:10:18 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:18 2021 daemon.warn openvpn(wan3)[2711]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:18 2021 daemon.err openvpn(wan3)[2711]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:18 2021 daemon.notice openvpn(wan3)[2711]: Exiting due to fatal error
Mon Apr 26 21:10:20 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:10:21 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:21 2021 daemon.warn openvpn(wan3)[3137]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:21 2021 daemon.err openvpn(wan3)[3137]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:21 2021 daemon.notice openvpn(wan3)[3137]: Exiting due to fatal error
Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:26 2021 daemon.warn openvpn(wan3)[3583]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:26 2021 daemon.err openvpn(wan3)[3583]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:26 2021 daemon.notice openvpn(wan3)[3583]: Exiting due to fatal error
Mon Apr 26 21:10:27 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12)
Mon Apr 26 21:10:27 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3
Mon Apr 26 21:10:29 2021 user.notice post-tracking-post-tracking: Check API configuration...
Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:31 2021 daemon.warn openvpn(wan3)[4455]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:31 2021 daemon.err openvpn(wan3)[4455]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:31 2021 daemon.notice openvpn(wan3)[4455]: Exiting due to fatal error
Mon Apr 26 21:10:32 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Mon Apr 26 21:10:32 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:32 2021 daemon.warn openvpn(wan3)[4611]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:32 2021 daemon.err openvpn(wan3)[4611]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:32 2021 daemon.notice openvpn(wan3)[4611]: Exiting due to fatal error
Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Apr 26 21:10:37 2021 daemon.warn openvpn(wan3)[4789]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Mon Apr 26 21:10:37 2021 daemon.err openvpn(wan3)[4789]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Mon Apr 26 21:10:37 2021 daemon.notice openvpn(wan3)[4789]: Exiting due to fatal error

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Got same error again. But in this case the WAN1 is down due to outage. Although the bonding is not working, at least the user can still getting internet connection from single WAN (The user has 2 WAN only and WAN1 is currently down). In this case, if the WAN1 is down, the user can't access internet

Thu Apr 29 13:08:13 2021 daemon.notice openvpn(wan3)[27619]: Exiting due to fatal error
Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:18 2021 daemon.warn openvpn(wan3)[27745]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:18 2021 daemon.err openvpn(wan3)[27745]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:18 2021 daemon.notice openvpn(wan3)[27745]: Exiting due to fatal error
Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:23 2021 daemon.warn openvpn(wan3)[27854]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:23 2021 daemon.err openvpn(wan3)[27854]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:23 2021 daemon.notice openvpn(wan3)[27854]: Exiting due to fatal error
Thu Apr 29 13:08:26 2021 user.notice post-tracking-post-tracking: Check API configuration...
Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:28 2021 daemon.warn openvpn(wan3)[28051]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:28 2021 daemon.err openvpn(wan3)[28051]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:28 2021 daemon.notice openvpn(wan3)[28051]: Exiting due to fatal error
Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:33 2021 daemon.warn openvpn(wan3)[28332]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:33 2021 daemon.err openvpn(wan3)[28332]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:33 2021 daemon.notice openvpn(wan3)[28332]: Exiting due to fatal error
Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:38 2021 daemon.warn openvpn(wan3)[28588]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:38 2021 daemon.err openvpn(wan3)[28588]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:38 2021 daemon.notice openvpn(wan3)[28588]: Exiting due to fatal error
Thu Apr 29 13:08:43 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer)
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28751]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:43 2021 daemon.err openvpn(wan3)[28751]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28751]: Exiting due to fatal error
Thu Apr 29 13:08:43 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Thu Apr 29 13:08:43 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:43 2021 daemon.warn openvpn(wan3)[28849]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:43 2021 daemon.err openvpn(wan3)[28849]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:43 2021 daemon.notice openvpn(wan3)[28849]: Exiting due to fatal error
Thu Apr 29 13:08:44 2021 daemon.err glorytun[2561]: read: Connection reset by peer
Thu Apr 29 13:08:44 2021 daemon.info glorytun[2561]: STOPPED tun0
Thu Apr 29 13:08:45 2021 daemon.err glorytun[2561]: 27.112.X.X.65001: connected
Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:48 2021 daemon.warn openvpn(wan3)[29024]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:48 2021 daemon.err openvpn(wan3)[29024]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:48 2021 daemon.notice openvpn(wan3)[29024]: Exiting due to fatal error
Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:53 2021 daemon.warn openvpn(wan3)[29517]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:53 2021 daemon.err openvpn(wan3)[29517]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:53 2021 daemon.notice openvpn(wan3)[29517]: Exiting due to fatal error
Thu Apr 29 13:08:55 2021 daemon.err glorytun[2561]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 13:08:55 2021 daemon.info glorytun[2561]: STOPPED tun0
Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:08:58 2021 daemon.warn openvpn(wan3)[29762]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:08:58 2021 daemon.err openvpn(wan3)[29762]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:08:58 2021 daemon.notice openvpn(wan3)[29762]: Exiting due to fatal error
Thu Apr 29 13:08:59 2021 user.notice post-tracking-post-tracking: omrvpn down because gateway down
Thu Apr 29 13:08:59 2021 daemon.err omr-tracker[24407]: Failed to send request: Operation not permitted
Thu Apr 29 13:08:59 2021 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Network device 'tun0' link is down
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is now down
Thu Apr 29 13:08:59 2021 daemon.err glorytun[2561]: getpeername: Socket not connected
Thu Apr 29 13:08:59 2021 daemon.debug dnsmasq[23963]: stopped listening on tun0(#25): 10.255.255.2 port 53
Thu Apr 29 13:08:59 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: remove network interface tun0: event processed
Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: event reported: action=remove, name=tun0, subsystem=net
Thu Apr 29 13:08:59 2021 daemon.info glorytun[30074]: INITIALIZED tun0
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is disabled
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is enabled
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is disabled
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is enabled
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Network device 'tun0' link is up
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is setting up now
Thu Apr 29 13:08:59 2021 daemon.notice netifd: Interface 'omrvpn' is now up
Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: add network interface tun0: event processed
Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net
Thu Apr 29 13:08:59 2021 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Thu Apr 29 13:09:00 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0)
Thu Apr 29 13:09:00 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 13:09:02 2021 authpriv.info dropbear[31506]: Child connection from 192.168.120.224:50067
Thu Apr 29 13:09:02 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 13:09:03 2021 daemon.info dnsmasq[23963]: read /etc/hosts - 4 addresses
Thu Apr 29 13:09:03 2021 daemon.info dnsmasq[23963]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 13:09:03 2021 daemon.info dnsmasq-dhcp[23963]: read /etc/ethers - 0 addresses
Thu Apr 29 13:09:03 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 13:09:03 2021 user.notice Shadowsocks: Rules UP
Thu Apr 29 13:09:03 2021 user.notice Shadowsocks: Reload omr-bypass rules
Thu Apr 29 13:09:03 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:03 2021 daemon.warn openvpn(wan3)[31988]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:03 2021 daemon.err openvpn(wan3)[31988]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:03 2021 daemon.notice openvpn(wan3)[31988]: Exiting due to fatal error
Thu Apr 29 13:09:06 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 13:09:06 2021 daemon.info dnsmasq[23963]: read /etc/hosts - 4 addresses
Thu Apr 29 13:09:06 2021 daemon.info dnsmasq[23963]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 13:09:06 2021 daemon.info dnsmasq-dhcp[23963]: read /etc/ethers - 0 addresses
Thu Apr 29 13:09:06 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 13:09:06 2021 daemon.debug dnsmasq[23963]: listening on tun0(#26): 10.255.255.2 port 53
Thu Apr 29 13:09:07 2021 authpriv.notice dropbear[31506]: Password auth succeeded for 'root' from 192.168.120.224:50067
Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:08 2021 daemon.warn openvpn(wan3)[625]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:08 2021 daemon.err openvpn(wan3)[625]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:08 2021 daemon.notice openvpn(wan3)[625]: Exiting due to fatal error
Thu Apr 29 13:09:09 2021 daemon.err /usr/bin/ss-redir[25364]: remote recv: Host is unreachable
Thu Apr 29 13:09:10 2021 daemon.info omr-tracker-ss: Shadowsocks is down (can't contact via http 1.0.0.1, 212.27.48.10, 198.27.92.1, 151.101.129.164, 77.88.55.77, 1.1.1.1, 74.82.42.42)
Thu Apr 29 13:09:11 2021 user.notice Shadowsocks: Rules DOWN
Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:13 2021 daemon.warn openvpn(wan3)[998]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:13 2021 daemon.err openvpn(wan3)[998]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:13 2021 daemon.notice openvpn(wan3)[998]: Exiting due to fatal error
Thu Apr 29 13:09:15 2021 daemon.err /usr/bin/ss-redir[25364]: remote recv: Host is unreachable
Thu Apr 29 13:09:16 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:09:17 2021 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0)
Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:18 2021 daemon.warn openvpn(wan3)[1465]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:18 2021 daemon.err openvpn(wan3)[1465]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:18 2021 daemon.notice openvpn(wan3)[1465]: Exiting due to fatal error
Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:23 2021 daemon.warn openvpn(wan3)[1589]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:23 2021 daemon.err openvpn(wan3)[1589]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:23 2021 daemon.notice openvpn(wan3)[1589]: Exiting due to fatal error
Thu Apr 29 13:09:27 2021 daemon.info omr-tracker-ss: Server (27.112.X.X) seems down, no answer to ping
Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:28 2021 daemon.warn openvpn(wan3)[1702]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:28 2021 daemon.err openvpn(wan3)[1702]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:28 2021 daemon.notice openvpn(wan3)[1702]: Exiting due to fatal error
Thu Apr 29 13:09:29 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:34 2021 daemon.warn openvpn(wan3)[2172]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:34 2021 daemon.err openvpn(wan3)[2172]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:34 2021 daemon.notice openvpn(wan3)[2172]: Exiting due to fatal error
Thu Apr 29 13:09:37 2021 user.notice post-tracking-post-tracking: Check API configuration...
Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:39 2021 daemon.warn openvpn(wan3)[2372]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:39 2021 daemon.err openvpn(wan3)[2372]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:39 2021 daemon.notice openvpn(wan3)[2372]: Exiting due to fatal error
Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:44 2021 daemon.warn openvpn(wan3)[2490]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:44 2021 daemon.err openvpn(wan3)[2490]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:44 2021 daemon.notice openvpn(wan3)[2490]: Exiting due to fatal error
Thu Apr 29 13:09:48 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:49 2021 daemon.warn openvpn(wan3)[2595]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:49 2021 daemon.err openvpn(wan3)[2595]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:49 2021 daemon.notice openvpn(wan3)[2595]: Exiting due to fatal error
Thu Apr 29 13:09:53 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer)
Thu Apr 29 13:09:53 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Thu Apr 29 13:09:53 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:54 2021 daemon.warn openvpn(wan3)[2970]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:54 2021 daemon.err openvpn(wan3)[2970]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:54 2021 daemon.notice openvpn(wan3)[2970]: Exiting due to fatal error
Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:09:59 2021 daemon.warn openvpn(wan3)[3123]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:09:59 2021 daemon.err openvpn(wan3)[3123]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:09:59 2021 daemon.notice openvpn(wan3)[3123]: Exiting due to fatal error
Thu Apr 29 13:10:03 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:04 2021 daemon.warn openvpn(wan3)[3506]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:04 2021 daemon.err openvpn(wan3)[3506]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:04 2021 daemon.notice openvpn(wan3)[3506]: Exiting due to fatal error
Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:09 2021 daemon.warn openvpn(wan3)[3646]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:09 2021 daemon.err openvpn(wan3)[3646]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:09 2021 daemon.notice openvpn(wan3)[3646]: Exiting due to fatal error
Thu Apr 29 13:10:09 2021 daemon.err omr-tracker[24407]: Failed to send request: Operation not permitted
Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:14 2021 daemon.warn openvpn(wan3)[3940]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:14 2021 daemon.err openvpn(wan3)[3940]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:14 2021 daemon.notice openvpn(wan3)[3940]: Exiting due to fatal error
Thu Apr 29 13:10:17 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:19 2021 daemon.warn openvpn(wan3)[4058]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:19 2021 daemon.err openvpn(wan3)[4058]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:19 2021 daemon.notice openvpn(wan3)[4058]: Exiting due to fatal error
Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:24 2021 daemon.warn openvpn(wan3)[4172]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:24 2021 daemon.err openvpn(wan3)[4172]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:24 2021 daemon.notice openvpn(wan3)[4172]: Exiting due to fatal error
Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:29 2021 daemon.warn openvpn(wan3)[4292]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:29 2021 daemon.err openvpn(wan3)[4292]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:29 2021 daemon.notice openvpn(wan3)[4292]: Exiting due to fatal error
Thu Apr 29 13:10:33 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:34 2021 daemon.warn openvpn(wan3)[4588]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:34 2021 daemon.err openvpn(wan3)[4588]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:34 2021 daemon.notice openvpn(wan3)[4588]: Exiting due to fatal error
Thu Apr 29 13:10:38 2021 user.notice post-tracking-post-tracking: Check API configuration...
Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:39 2021 daemon.warn openvpn(wan3)[4780]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:39 2021 daemon.err openvpn(wan3)[4780]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:39 2021 daemon.notice openvpn(wan3)[4780]: Exiting due to fatal error
Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:44 2021 daemon.warn openvpn(wan3)[4907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:44 2021 daemon.err openvpn(wan3)[4907]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:44 2021 daemon.notice openvpn(wan3)[4907]: Exiting due to fatal error
Thu Apr 29 13:10:47 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer)
Thu Apr 29 13:10:47 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Thu Apr 29 13:10:47 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:47 2021 daemon.notice openvpn(wan3)[5058]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:47 2021 daemon.notice openvpn(wan3)[5058]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:47 2021 daemon.warn openvpn(wan3)[5058]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:48 2021 daemon.notice openvpn(wan3)[5058]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:48 2021 daemon.err openvpn(wan3)[5058]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:48 2021 daemon.notice openvpn(wan3)[5058]: Exiting due to fatal error
Thu Apr 29 13:10:48 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:53 2021 daemon.warn openvpn(wan3)[5169]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:53 2021 daemon.err openvpn(wan3)[5169]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:53 2021 daemon.notice openvpn(wan3)[5169]: Exiting due to fatal error
Thu Apr 29 13:10:53 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:10:58 2021 daemon.warn openvpn(wan3)[5565]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:10:58 2021 daemon.err openvpn(wan3)[5565]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:10:58 2021 daemon.notice openvpn(wan3)[5565]: Exiting due to fatal error
Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:11:03 2021 daemon.warn openvpn(wan3)[5701]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:11:03 2021 daemon.err openvpn(wan3)[5701]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:11:03 2021 daemon.notice openvpn(wan3)[5701]: Exiting due to fatal error
Thu Apr 29 13:11:03 2021 daemon.err omr-tracker[24407]: Failed to send request: Operation not permitted
Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:11:08 2021 daemon.warn openvpn(wan3)[5789]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:11:08 2021 daemon.err openvpn(wan3)[5789]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:11:08 2021 daemon.notice openvpn(wan3)[5789]: Exiting due to fatal error
Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:11:13 2021 daemon.warn openvpn(wan3)[5878]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:11:13 2021 daemon.err openvpn(wan3)[5878]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:11:13 2021 daemon.notice openvpn(wan3)[5878]: Exiting due to fatal error
Thu Apr 29 13:11:14 2021 daemon.err /usr/bin/ss-local[25361]: getpeername: Socket not connected
Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:11:18 2021 daemon.warn openvpn(wan3)[6009]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:11:18 2021 daemon.err openvpn(wan3)[6009]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:11:18 2021 daemon.notice openvpn(wan3)[6009]: Exiting due to fatal error
Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 13:11:23 2021 daemon.warn openvpn(wan3)[6121]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 13:11:23 2021 daemon.err openvpn(wan3)[6121]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 13:11:23 2021 daemon.notice openvpn(wan3)[6121]: Exiting due to fatal error

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Here is the settings of my OMR

Dashboard
Status
Overview
Firewall
Routes
System Log
Kernel Log
Processes
Realtime Graphs
vnStat Traffic Monitor
System
OpenMPTCProuter
System
Administration
ACL Settings
Software
Startup
Scheduled Tasks
Mount Points
Backup / Flash Firmware
Reboot
Shutdown
Services
OMR-Tracker
iPerf
Proxy DNS Over HTTPS
Shadowsocks-libev
OMR-Bypass
Packet Capture
E-Mail
Wake on LAN
Terminal
uHTTPd
UPnP
Recursive DNS
Network
MPTCP
Interfaces
DHCP and DNS
Hostnames
Static Routes
SQM QoS
Firewall
Diagnostics
OMR-DSCP
Quota
SNMPd
VPN
MLVPN
Glorytun TCP
Glorytun UDP
DSVPN
OpenVPN
Logout
Settings Wizard
Status
Advanced Settings
Backup on server
Show all settings
All router settings
dhcp.@dnsmasq[0]=dnsmasq
dhcp.@dnsmasq[0].domainneeded='1'
dhcp.@dnsmasq[0].boguspriv='1'
dhcp.@dnsmasq[0].filterwin2k='0'
dhcp.@dnsmasq[0].localise_queries='1'
dhcp.@dnsmasq[0].rebind_protection='1'
dhcp.@dnsmasq[0].rebind_localhost='1'
dhcp.@dnsmasq[0].local='/lan/'
dhcp.@dnsmasq[0].domain='lan'
dhcp.@dnsmasq[0].expandhosts='1'
dhcp.@dnsmasq[0].authoritative='1'
dhcp.@dnsmasq[0].readethers='1'
dhcp.@dnsmasq[0].leasefile='/tmp/dhcp.leases'
dhcp.@dnsmasq[0].resolvfile='/tmp/resolv.conf.d/resolv.conf.auto'
dhcp.@dnsmasq[0].nonwildcard='1'
dhcp.@dnsmasq[0].localservice='1'
dhcp.@dnsmasq[0].ednspacket_max='1232'
dhcp.@dnsmasq[0].server='127.0.0.1#5353' '/lan/' '/use-application-dns.net/'
dhcp.@dnsmasq[0].noresolv='1'
dhcp.@dnsmasq[0].nonegcache='1'
dhcp.@dnsmasq[0].rebind_domain='plex.direct'
dhcp.@dnsmasq[0].ipset='/mmg-fna.whatsapp.net/omr_dscp-cs1,omr_dscp6-cs1' '/googlevideo.com/omr_dscp-cs4,omr_dscp6-cs4' '/upload.youtube.com/omr_dscp-cs1,omr_dscp6-cs1' '/nflxvideo.net/omr_dscp-cs4,omr_dscp6-cs4' '/upload.video.google.com/omr_dscp-cs1,omr_dscp6-cs1' '/s3.ll.dash.row.aiv-cdn.net/omr_dscp-cs4,omr_dscp6-cs4' '/windowsupdate.com/omr_dscp-cs1,omr_dscp6-cs1' '/d25xi40x97liuc.cloudfront.net/omr_dscp-cs4,omr_dscp6-cs4' '/update.microsoft.com/omr_dscp-cs1,omr_dscp6-cs1' '/aiv-delivery.net/omr_dscp-cs4,omr_dscp6-cs4' '/vevo.com/omr_dscp-cs4,omr_dscp6-cs4' '/audio-fa.scdn.com/omr_dscp-cs4,omr_dscp6-cs4' '/deezer.com/omr_dscp-cs4,omr_dscp6-cs4' '/sndcdn.com/omr_dscp-cs4,omr_dscp6-cs4' '/last.fm/omr_dscp-cs4,omr_dscp6-cs4' '/v.redd.it/omr_dscp-cs4,omr_dscp6-cs4' '/ttvnw.net/omr_dscp-cs4,omr_dscp6-cs4,omr_dscp-cs4,omr_dscp6-cs4' '/googletagmanager.com/omr_dscp-cs2,omr_dscp6-cs2' '/googleusercontent.com/omr_dscp-cs2,omr_dscp6-cs2' '/google.com/omr_dscp-cs2,omr_dscp6-cs2' '/fbcdn.net/omr_dscp-cs4,omr_dscp6-cs4,omr_dscp-cs2,omr_dscp6-cs2' '/akamaihd.net/omr_dscp-cs2,omr_dscp6-cs2' '/whatsapp.net/omr_dscp-cs2,omr_dscp6-cs2' '/whatsapp.com/omr_dscp-cs2,omr_dscp6-cs2' '/googleapis.com/omr_dscp-cs2,omr_dscp6-cs2' '/1e100.net/omr_dscp-cs2,omr_dscp6-cs2' '/hwcdn.net/omr_dscp-cs2,omr_dscp6-cs2' '/download.qq.com/omr_dscp-cs1,omr_dscp6-cs1' '/steamcontent.com/omr_dscp-cs1,omr_dscp6-cs1' '/gs2.ww.prod.dl.playstation.net/omr_dscp-cs1,omr_dscp6-cs1' '/dropbox.com/omr_dscp-cs1,omr_dscp6-cs1' '/dropboxstatic.com/omr_dscp-cs1,omr_dscp6-cs1' '/dropbox-dns.com/omr_dscp-cs1,omr_dscp6-cs1' '/log.getdropbox.com/omr_dscp-cs1,omr_dscp6-cs1' '/drive.google.com/omr_dscp-cs1,omr_dscp6-cs1' '/drive-thirdparty.googleusercontent.com/omr_dscp-cs1,omr_dscp6-cs1' '/docs.google.com/omr_dscp-cs1,omr_dscp6-cs1' '/docs.googleusercontent.com/omr_dscp-cs1,omr_dscp6-cs1' '/gvt1.com/omr_dscp-cs1,omr_dscp6-cs1'
dhcp.lan=dhcp
dhcp.lan.interface='lan'
dhcp.lan.start='100'
dhcp.lan.limit='150'
dhcp.lan.leasetime='12h'
dhcp.lan.ra_slaac='1'
dhcp.lan.ra_flags='managed-config' 'other-config'
dhcp.lan.force='1'
dhcp.wan=dhcp
dhcp.wan.interface='wan'
dhcp.wan.ignore='1'
dhcp.odhcpd=odhcpd
dhcp.odhcpd.maindhcp='0'
dhcp.odhcpd.leasefile='/tmp/hosts/odhcpd'
dhcp.odhcpd.leasetrigger='/usr/sbin/odhcpd-update'
dhcp.odhcpd.loglevel='4'
dropbear.@dropbear[0]=dropbear
dropbear.@dropbear[0].PasswordAuth='on'
dropbear.@dropbear[0].RootPasswordAuth='on'
dropbear.@dropbear[0].Port='22'
dscp.@classify[0]=classify
dscp.@classify[0].direction='both'
dscp.@classify[0].proto='icmp'
dscp.@classify[0].class='cs5'
dscp.@classify[0].comment='ICMP'
dscp.@classify[1]=classify
dscp.@classify[1].direction='both'
dscp.@classify[1].proto='udp'
dscp.@classify[1].class='cs5'
dscp.@classify[1].src_port='53,123,5353'
dscp.@classify[1].comment='DNS udp and NTP'
dscp.@classify[2]=classify
dscp.@classify[2].direction='both'
dscp.@classify[2].proto='tcp'
dscp.@classify[2].class='cs5'
dscp.@classify[2].src_port='53,5353'
dscp.@classify[2].comment='DNS tcp'
dscp.@classify[3]=classify
dscp.@classify[3].direction='both'
dscp.@classify[3].proto='tcp'
dscp.@classify[3].class='cs6'
dscp.@classify[3].dest_port='65001,65301,65011'
dscp.@classify[3].comment='OMR vpn'
dscp.@classify[4]=classify
dscp.@classify[4].direction='both'
dscp.@classify[4].proto='udp'
dscp.@classify[4].class='cs6'
dscp.@classify[4].dest_port='65001,65301'
dscp.@classify[4].comment='OMR vpn'
dscp.@domains[0]=domains
dscp.@domains[0].name='googlevideo.com'
dscp.@domains[0].class='cs4'
dscp.@domains[0].comment='Youtube'
dscp.@domains[1]=domains
dscp.@domains[1].name='nflxvideo.net'
dscp.@domains[1].class='cs4'
dscp.@domains[1].comment='NetFlix'
dscp.@domains[2]=domains
dscp.@domains[2].name='s3.ll.dash.row.aiv-cdn.net'
dscp.@domains[2].class='cs4'
dscp.@domains[2].comment='AmazonVideo'
dscp.@domains[3]=domains
dscp.@domains[3].name='d25xi40x97liuc.cloudfront.net'
dscp.@domains[3].class='cs4'
dscp.@domains[3].comment='AmazonVideo'
dscp.@domains[4]=domains
dscp.@domains[4].name='aiv-delivery.net'
dscp.@domains[4].class='cs4'
dscp.@domains[4].comment='AmazonVideo'
dscp.@domains[5]=domains
dscp.@domains[5].name='fbcdn.net'
dscp.@domains[5].class='cs4'
dscp.@domains[5].comment='Facebook'
dscp.@domains[6]=domains
dscp.@domains[6].name='ttvnw.net'
dscp.@domains[6].class='cs4'
dscp.@domains[6].comment='Twitch'
dscp.@domains[7]=domains
dscp.@domains[7].name='vevo.com'
dscp.@domains[7].class='cs4'
dscp.@domains[7].comment='VeVo'
dscp.@domains[8]=domains
dscp.@domains[8].name='audio-fa.scdn.com'
dscp.@domains[8].class='cs4'
dscp.@domains[8].comment='Spotify'
dscp.@domains[9]=domains
dscp.@domains[9].name='deezer.com'
dscp.@domains[9].class='cs4'
dscp.@domains[9].comment='Deezer'
dscp.@domains[10]=domains
dscp.@domains[10].name='sndcdn.com'
dscp.@domains[10].class='cs4'
dscp.@domains[10].comment='SoundCloud'
dscp.@domains[11]=domains
dscp.@domains[11].name='last.fm'
dscp.@domains[11].class='cs4'
dscp.@domains[11].comment='last.fm'
dscp.@domains[12]=domains
dscp.@domains[12].name='v.redd.it'
dscp.@domains[12].class='cs4'
dscp.@domains[12].comment='reddit videos'
dscp.@domains[13]=domains
dscp.@domains[13].name='ttvnw.net'
dscp.@domains[13].class='cs4'
dscp.@domains[13].comment='twitch.tv'
dscp.@domains[14]=domains
dscp.@domains[14].name='googletagmanager.com'
dscp.@domains[14].class='cs2'
dscp.@domains[14].comment='cdn'
dscp.@domains[15]=domains
dscp.@domains[15].name='googleusercontent.com'
dscp.@domains[15].class='cs2'
dscp.@domains[15].comment='cdn'
dscp.@domains[16]=domains
dscp.@domains[16].name='google.com'
dscp.@domains[16].class='cs2'
dscp.@domains[16].comment='cdn'
dscp.@domains[17]=domains
dscp.@domains[17].name='fbcdn.net'
dscp.@domains[17].class='cs2'
dscp.@domains[17].comment='cdn'
dscp.@domains[18]=domains
dscp.@domains[18].name='akamaihd.net'
dscp.@domains[18].class='cs2'
dscp.@domains[18].comment='cdn'
dscp.@domains[19]=domains
dscp.@domains[19].name='whatsapp.net'
dscp.@domains[19].class='cs2'
dscp.@domains[19].comment='cdn'
dscp.@domains[20]=domains
dscp.@domains[20].name='whatsapp.com'
dscp.@domains[20].class='cs2'
dscp.@domains[20].comment='cdn'
dscp.@domains[21]=domains
dscp.@domains[21].name='googleapis.com'
dscp.@domains[21].class='cs2'
dscp.@domains[21].comment='cdn'
dscp.@domains[22]=domains
dscp.@domains[22].name='1e100.net'
dscp.@domains[22].class='cs2'
dscp.@domains[22].comment='cdn'
dscp.@domains[23]=domains
dscp.@domains[23].name='hwcdn.net'
dscp.@domains[23].class='cs2'
dscp.@domains[23].comment='cdn'
dscp.@domains[24]=domains
dscp.@domains[24].name='download.qq.com'
dscp.@domains[24].class='cs1'
dscp.@domains[24].comment='qq download'
dscp.@domains[25]=domains
dscp.@domains[25].name='steamcontent.com'
dscp.@domains[25].class='cs1'
dscp.@domains[25].comment='Steam download'
dscp.@domains[26]=domains
dscp.@domains[26].name='gs2.ww.prod.dl.playstation.net'
dscp.@domains[26].class='cs1'
dscp.@domains[26].comment='PSN download'
dscp.@domains[27]=domains
dscp.@domains[27].name='dropbox.com'
dscp.@domains[27].class='cs1'
dscp.@domains[27].comment='Dropbox'
dscp.@domains[28]=domains
dscp.@domains[28].name='dropboxstatic.com'
dscp.@domains[28].class='cs1'
dscp.@domains[28].comment='Dropbox'
dscp.@domains[29]=domains
dscp.@domains[29].name='dropbox-dns.com'
dscp.@domains[29].class='cs1'
dscp.@domains[29].comment='Dropbox'
dscp.@domains[30]=domains
dscp.@domains[30].name='log.getdropbox.com'
dscp.@domains[30].class='cs1'
dscp.@domains[30].comment='Dropbox'
dscp.@domains[31]=domains
dscp.@domains[31].name='drive.google.com'
dscp.@domains[31].class='cs1'
dscp.@domains[31].comment='Google Drive'
dscp.@domains[32]=domains
dscp.@domains[32].name='drive-thirdparty.googleusercontent.com'
dscp.@domains[32].class='cs1'
dscp.@domains[32].comment='Google Drive'
dscp.@domains[33]=domains
dscp.@domains[33].name='docs.google.com'
dscp.@domains[33].class='cs1'
dscp.@domains[33].comment='Google Docs'
dscp.@domains[34]=domains
dscp.@domains[34].name='docs.googleusercontent.com'
dscp.@domains[34].class='cs1'
dscp.@domains[34].comment='Google Docs'
dscp.@domains[35]=domains
dscp.@domains[35].name='gvt1.com'
dscp.@domains[35].class='cs1'
dscp.@domains[35].comment='PlayStore Download'
dscp.@domains[36]=domains
dscp.@domains[36].name='mmg-fna.whatsapp.net'
dscp.@domains[36].class='cs1'
dscp.@domains[36].comment='WhatsApp Files'
dscp.@domains[37]=domains
dscp.@domains[37].name='upload.youtube.com'
dscp.@domains[37].class='cs1'
dscp.@domains[37].comment='Youtube Upload'
dscp.@domains[38]=domains
dscp.@domains[38].name='upload.video.google.com'
dscp.@domains[38].class='cs1'
dscp.@domains[38].comment='Youtube Upload'
dscp.@domains[39]=domains
dscp.@domains[39].name='windowsupdate.com'
dscp.@domains[39].class='cs1'
dscp.@domains[39].comment='WindowsUpdate'
dscp.@domains[40]=domains
dscp.@domains[40].name='update.microsoft.com'
dscp.@domains[40].class='cs1'
dscp.@domains[40].comment='WindowsUpdate'
dsvpn.vpn=dsvpn
dsvpn.vpn.dev='tun0'
dsvpn.vpn.localip='10.255.251.2'
dsvpn.vpn.remoteip='10.255.251.1'
dsvpn.vpn.mode='client'
dsvpn.vpn.enable='0'
dsvpn.vpn.host='27.112.X.X'
dsvpn.vpn.key='5219E55C91C14926406760D77D328C78C55447561F13BEA105E768F12C948E5B'
dsvpn.vpn.port='65401'
etherwake.setup=etherwake
etherwake.setup.pathes='/usr/bin/etherwake /usr/bin/ether-wake'
etherwake.setup.sudo='off'
etherwake.setup.broadcast='off'
etherwake.@target[0]=target
etherwake.@target[0].name='example'
etherwake.@target[0].mac='11:22:33:44:55:66'
etherwake.@target[0].password='AABBCCDDEEFF'
etherwake.@target[0].wakeonboot='off'
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood='1'
firewall.@defaults[0].forward='REJECT'
firewall.@defaults[0].input='REJECT'
firewall.@defaults[0].output='REJECT'
firewall.@zone[0]=zone
firewall.@zone[0].name='lan'
firewall.@zone[0].network='lan'
firewall.@zone[0].input='ACCEPT'
firewall.@zone[0].output='ACCEPT'
firewall.@zone[0].forward='ACCEPT'
firewall.@zone[0].auto_helper='0'
firewall.@zone[0].mtu_fix='1'
firewall.@zone[1]=zone
firewall.@zone[1].name='wan'
firewall.@zone[1].input='REJECT'
firewall.@zone[1].output='ACCEPT'
firewall.@zone[1].forward='REJECT'
firewall.@zone[1].masq='1'
firewall.@zone[1].mtu_fix='1'
firewall.@zone[1].network='wan' 'wan6' 'wan1' 'wan2' 'wan3'
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src='lan'
firewall.@forwarding[0].dest='wan'
firewall.@rule[0]=rule
firewall.@rule[0].name='Allow-DHCP-Renew'
firewall.@rule[0].src='wan'
firewall.@rule[0].proto='udp'
firewall.@rule[0].dest_port='68'
firewall.@rule[0].target='ACCEPT'
firewall.@rule[0].family='ipv4'
firewall.@rule[1]=rule
firewall.@rule[1].name='Allow-Ping'
firewall.@rule[1].src='wan'
firewall.@rule[1].proto='icmp'
firewall.@rule[1].icmp_type='echo-request'
firewall.@rule[1].family='ipv4'
firewall.@rule[1].target='ACCEPT'
firewall.@rule[2]=rule
firewall.@rule[2].name='Allow-IGMP'
firewall.@rule[2].src='wan'
firewall.@rule[2].proto='igmp'
firewall.@rule[2].family='ipv4'
firewall.@rule[2].target='ACCEPT'
firewall.@rule[3]=rule
firewall.@rule[3].name='Allow-DHCPv6'
firewall.@rule[3].src='wan'
firewall.@rule[3].proto='udp'
firewall.@rule[3].src_ip='fc00::/6'
firewall.@rule[3].dest_ip='fc00::/6'
firewall.@rule[3].dest_port='546'
firewall.@rule[3].family='ipv6'
firewall.@rule[3].target='ACCEPT'
firewall.@rule[4]=rule
firewall.@rule[4].name='Allow-MLD'
firewall.@rule[4].src='wan'
firewall.@rule[4].proto='icmp'
firewall.@rule[4].src_ip='fe80::/10'
firewall.@rule[4].icmp_type='130/0' '131/0' '132/0' '143/0'
firewall.@rule[4].family='ipv6'
firewall.@rule[4].target='ACCEPT'
firewall.@rule[5]=rule
firewall.@rule[5].name='Allow-ICMPv6-Forward'
firewall.@rule[5].src='wan'
firewall.@rule[5].dest=''
firewall.@rule[5].proto='icmp'
firewall.@rule[5].icmp_type='echo-request' 'echo-reply' 'destination-unreachable' 'packet-too-big' 'time-exceeded' 'bad-header' 'unknown-header-type'
firewall.@rule[5].limit='1000/sec'
firewall.@rule[5].family='ipv6'
firewall.@rule[5].target='ACCEPT'
firewall.@rule[6]=rule
firewall.@rule[6].name='Allow-IPSec-ESP'
firewall.@rule[6].src='wan'
firewall.@rule[6].dest='lan'
firewall.@rule[6].proto='esp'
firewall.@rule[6].target='ACCEPT'
firewall.@rule[7]=rule
firewall.@rule[7].name='Allow-ISAKMP'
firewall.@rule[7].src='wan'
firewall.@rule[7].dest='lan'
firewall.@rule[7].dest_port='500'
firewall.@rule[7].proto='udp'
firewall.@rule[7].target='ACCEPT'
firewall.@rule[8]=rule
firewall.@rule[8].name='Support-UDP-Traceroute'
firewall.@rule[8].src='wan'
firewall.@rule[8].dest_port='33434:33689'
firewall.@rule[8].proto='udp'
firewall.@rule[8].family='ipv4'
firewall.@rule[8].target='REJECT'
firewall.@rule[8].enabled='false'
firewall.@include[0]=include
firewall.@include[0].path='/etc/firewall.user'
firewall.@rule[9]=rule
firewall.@rule[9].enabled='1'
firewall.@rule[9].target='ACCEPT'
firewall.@rule[9].name='Allow-All-LAN-to-VPN'
firewall.@rule[9].dest='vpn'
firewall.@rule[9].src='lan'
firewall.zone_vpn=zone
firewall.zone_vpn.name='vpn'
firewall.zone_vpn.masq='1'
firewall.zone_vpn.input='REJECT'
firewall.zone_vpn.forward='ACCEPT'
firewall.zone_vpn.output='ACCEPT'
firewall.zone_vpn.network='glorytun' 'omrvpn' 'omr6in4' 'ovpnwan3'
firewall.zone_vpn.mtu_fix='1'
firewall.@rule[10]=rule
firewall.@rule[10].enabled='1'
firewall.@rule[10].target='ACCEPT'
firewall.@rule[10].name='Allow-All-Ping'
firewall.@rule[10].proto='icmp'
firewall.@rule[10].dest='
'
firewall.@rule[10].src=''
firewall.@rule[10].icmp_type='echo-request'
firewall.@rule[11]=rule
firewall.@rule[11].enabled='1'
firewall.@rule[11].target='ACCEPT'
firewall.@rule[11].name='Allow-VPN-ICMP'
firewall.@rule[11].proto='icmp'
firewall.@rule[11].src='vpn'
firewall.@rule[12]=rule
firewall.@rule[12].enabled='1'
firewall.@rule[12].target='ACCEPT'
firewall.@rule[12].name='Allow-Lan-to-Wan'
firewall.@rule[12].dest='wan'
firewall.@rule[12].src='lan'
firewall.@rule[13]=rule
firewall.@rule[13].enabled='1'
firewall.@rule[13].target='ACCEPT'
firewall.@rule[13].name='ICMPv6-Lan-to-OMR'
firewall.@rule[13].src='lan'
firewall.@rule[13].family='ipv6'
firewall.@rule[13].proto='icmp'
firewall.@rule[13].limit='1000/sec'
firewall.@rule[13].icmp_type='echo-reply destination-unreachable echo-request router-advertisement router-solicitation time-exceeded'
firewall.omr_server=include
firewall.omr_server.path='/etc/firewall.omr-server'
firewall.omr_server.reload='1'
firewall.gre_tunnel=include
firewall.gre_tunnel.path='/etc/firewall.gre-tunnel'
firewall.gre_tunnel.reload='1'
firewall.fwlantovpn=forwarding
firewall.fwlantovpn.src='lan'
firewall.fwlantovpn.dest='vpn'
firewall.blockquicproxy=rule
firewall.blockquicproxy.name='Block QUIC Proxy'
firewall.blockquicproxy.proto='udp'
firewall.blockquicproxy.dest_port='443'
firewall.blockquicproxy.target='DROP'
firewall.blockquicproxy.src='lan'
firewall.blockquicall=rule
firewall.blockquicall.name='Block QUIC All'
firewall.blockquicall.proto='udp'
firewall.blockquicall.src='
'
firewall.blockquicall.dest=''
firewall.blockquicall.dest_port='443'
firewall.blockquicall.target='DROP'
firewall.allow_dhcp_request_vpn=rule
firewall.allow_dhcp_request_vpn.name='Allow-DHCP-Request-VPN'
firewall.allow_dhcp_request_vpn.src='vpn'
firewall.allow_dhcp_request_vpn.proto='udp'
firewall.allow_dhcp_request_vpn.dest_port='67'
firewall.allow_dhcp_request_vpn.target='ACCEPT'
firewall.allow_dhcp_request_vpn.family='ipv4'
firewall.v2ray=include
firewall.v2ray.path='/etc/firewall.v2ray-rules'
firewall.v2ray.reload='1'
firewall.omr_bypass=include
firewall.omr_bypass.path='/etc/firewall.omr-bypass'
firewall.omr_bypass.reload='1'
firewall.miniupnpd=include
firewall.miniupnpd.type='script'
firewall.miniupnpd.path='/usr/share/miniupnpd/firewall.include'
firewall.miniupnpd.family='any'
firewall.miniupnpd.reload='1'
firewall.ss_rules=include
firewall.ss_rules.path='/etc/firewall.ss-rules'
firewall.ss_rules.reload='1'
firewall.@reDIrect[0]=redirect
firewall.@reDIrect[0].target='DNAT'
firewall.@reDIrect[0].name='DMZ'
firewall.@reDIrect[0].proto='all'
firewall.@reDIrect[0].src='vpn'
firewall.@reDIrect[0].dest='lan'
firewall.@reDIrect[0].dest_ip='192.168.120.123'
fstab.@global[0]=global
fstab.@global[0].anon_swap='0'
fstab.@global[0].anon_mount='0'
fstab.@global[0].auto_swap='1'
fstab.@global[0].auto_mount='1'
fstab.@global[0].delay_root='5'
fstab.@global[0].check_fs='0'
fstab.@mount[0]=mount
fstab.@mount[0].target='/overlay'
fstab.@mount[0].uuid='550cca64-bb82-4872-99b3-3f37dc90d031'
fstab.@mount[0].enabled='0'
fstab.@mount[1]=mount
fstab.@mount[1].target='/boot'
fstab.@mount[1].uuid='84173db5-fa99-e35a-95c6-28613cc79ea9'
fstab.@mount[1].enabled='0'
fstab.@mount[2]=mount
fstab.@mount[2].target='/rom'
fstab.@mount[2].uuid='84dadda6-db96d3e5-05323332-ae4ae5ad'
fstab.@mount[2].enabled='0'
glorytun.vpn=glorytun
glorytun.vpn.port='65001'
glorytun.vpn.dev='tun0'
glorytun.vpn.mptcp='1'
glorytun.vpn.proto='tcp'
glorytun.vpn.chacha20='1'
glorytun.vpn.mtuauto='1'
glorytun.vpn.localip='10.255.255.2'
glorytun.vpn.remoteip='10.255.255.1'
glorytun.vpn.multiqueue='1'
glorytun.vpn.label='Default VPN'
glorytun.vpn.enable='1'
glorytun.vpn.host='27.112.X.X'
glorytun.vpn.key='C67AE01F9C1739FAC502AAF80B563602359784519C1C7C5CEC89C4E020E01BFB'
glorytun-udp.vpn=glorytun-udp
glorytun-udp.vpn.enable='0'
glorytun-udp.vpn.port='65001'
glorytun-udp.vpn.dev='tun0'
glorytun-udp.vpn.chacha='1'
glorytun-udp.vpn.localip='10.255.254.2'
glorytun-udp.vpn.remoteip='10.255.254.1'
glorytun-udp.vpn.mode='to'
glorytun-udp.vpn.host='27.112.X.X'
glorytun-udp.vpn.key='C67AE01F9C1739FAC502AAF80B563602359784519C1C7C5CEC89C4E020E01BFB'
https-dns-proxy.config=main
https-dns-proxy.config.update_dnsmasq_config='
'
https-dns-proxy.@https-dns-proxy[0]=https-dns-proxy
https-dns-proxy.@https-dns-proxy[0].bootstrap_dns='8.8.8.8,8.8.4.4'
https-dns-proxy.@https-dns-proxy[0].resolver_url='https://dns.google/dns-query'
https-dns-proxy.@https-dns-proxy[0].listen_addr='127.0.0.1'
https-dns-proxy.@https-dns-proxy[0].listen_port='5053'
https-dns-proxy.@https-dns-proxy[0].user='nobody'
https-dns-proxy.@https-dns-proxy[0].group='nogroup'
https-dns-proxy.@https-dns-proxy[1]=https-dns-proxy
https-dns-proxy.@https-dns-proxy[1].bootstrap_dns='1.1.1.1,1.0.0.1'
https-dns-proxy.@https-dns-proxy[1].resolver_url='https://cloudflare-dns.com/dns-query'
https-dns-proxy.@https-dns-proxy[1].listen_addr='127.0.0.1'
https-dns-proxy.@https-dns-proxy[1].listen_port='5054'
https-dns-proxy.@https-dns-proxy[1].user='nobody'
https-dns-proxy.@https-dns-proxy[1].group='nogroup'
igmpproxy.@igmpproxy[0]=igmpproxy
igmpproxy.@igmpproxy[0].quickleave='1'
igmpproxy.@phyint[0]=phyint
igmpproxy.@phyint[0].network='wan'
igmpproxy.@phyint[0].zone='wan'
igmpproxy.@phyint[0].direction='upstream'
igmpproxy.@phyint[0].altnet='192.168.1.0/24'
igmpproxy.@phyint[1]=phyint
igmpproxy.@phyint[1].network='lan'
igmpproxy.@phyint[1].zone='lan'
igmpproxy.@phyint[1].direction='downstream'
iperf.bouygues=server
iperf.bouygues.host='bouygues.iperf.fr'
iperf.bouygues.ipv4='1'
iperf.bouygues.ipv6='1'
iperf.bouygues.speed='10000'
iperf.bouygues.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209'
iperf.bouygues.tcp='1'
iperf.bouygues.udp='0'
iperf.bouygues.location='Europe'
iperf.online_ipv4=server
iperf.online_ipv4.host='ping.online.net'
iperf.online_ipv4.ipv4='1'
iperf.online_ipv4.ipv6='0'
iperf.online_ipv4.speed='10000'
iperf.online_ipv4.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209'
iperf.online_ipv4.tcp='1'
iperf.online_ipv4.udp='1'
iperf.online_ipv4.location='Europe'
iperf.online_ipv6=server
iperf.online_ipv6.host='ping.online.net'
iperf.online_ipv6.ipv4='0'
iperf.online_ipv6.ipv6='1'
iperf.online_ipv6.speed='10000'
iperf.online_ipv6.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209'
iperf.online_ipv6.tcp='1'
iperf.online_ipv6.udp='1'
iperf.online_ipv6.location='Europe'
iperf.serverius=server
iperf.serverius.host='speedtest.serverius.net'
iperf.serverius.ipv4='1'
iperf.serverius.ipv6='1'
iperf.serverius.speed='10000'
iperf.serverius.ports='5002'
iperf.serverius.tcp='1'
iperf.serverius.udp='1'
iperf.serverius.location='Europe'
iperf.eenet=server
iperf.eenet.host='iperf.eenet.ee'
iperf.eenet.ipv4='1'
iperf.eenet.ipv6='0'
iperf.eenet.ports='5201'
iperf.eenet.tcp='1'
iperf.eenet.udp='1'
iperf.eenet.location='Europe'
iperf.volia=server
iperf.volia.host='iperf.volia.net'
iperf.volia.ipv4='1'
iperf.volia.ipv6='0'
iperf.volia.ports='5201'
iperf.volia.tcp='1'
iperf.volia.udp='1'
iperf.volia.location='Europe'
iperf.it_north=server
iperf.it_north.host='iperf.it-north.net'
iperf.it_north.ipv4='1'
iperf.it_north.ipv6='0'
iperf.it_north.speed='1000'
iperf.it_north.ports='5200,5201,5202,5203,5204,5205,5206,5207,5208,5209'
iperf.it_north.tcp='1'
iperf.it_north.udp='1'
iperf.it_north.location='Asia'
iperf.biznet=server
iperf.biznet.host='iperf.biznetnetworkds.com'
iperf.biznet.ipv4='1'
iperf.biznet.ipv6='1'
iperf.biznet.speed='1000'
iperf.biznet.ports='5201,5202,5203'
iperf.biznet.tcp='1'
iperf.biznet.udp='0'
iperf.biznet.location='Asia'
iperf.scottlinux=server
iperf.scottlinux.host='iperf.scottlinux.com'
iperf.scottlinux.ipv4='1'
iperf.scottlinux.ipv6='1'
iperf.scottlinux.speed='1000'
iperf.scottlinux.ports='5201'
iperf.scottlinux.tcp='1'
iperf.scottlinux.udp='1'
iperf.scottlinux.location='America'
iperf.he=server
iperf.he.host='iperf.he.net'
iperf.he.ipv4='1'
iperf.he.ipv6='1'
iperf.he.ports='5201'
iperf.he.tcp='1'
iperf.he.udp='1'
iperf.he.location='America'
iperf.vps=server
iperf.vps.host='27.112.X.X'
iperf.vps.ports='65400'
iperf.vps.ipv4='1'
iperf.vps.ipv6='0'
iperf.vps.speed='1000'
iperf.vps.tcp='1'
iperf.vps.udp='1'
iperf.vps.user='openmptcprouter'
iperf.vps.password='openmptcprouter'
iperf.vps.key='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'
luci.main=core
luci.main.lang='auto'
luci.main.resourcebase='/luci-static/resources'
luci.main.ubuspath='/ubus/'
luci.main.mediaurlbase='/luci-static/openmptcprouter'
luci.flash_keep=extern
luci.flash_keep.uci='/etc/config/'
luci.flash_keep.dropbear='/etc/dropbear/'
luci.flash_keep.openvpn='/etc/openvpn/'
luci.flash_keep.passwd='/etc/passwd'
luci.flash_keep.opkg='/etc/opkg.conf'
luci.flash_keep.firewall='/etc/firewall.user'
luci.flash_keep.uploads='/lib/uci/upload/'
luci.languages=internal
luci.languages.ar='العربية (Arabic)'
luci.languages.bg='български (Bulgarian)'
luci.languages.bn='বাংলা (Bengali)'
luci.languages.ca='Català (Catalan)'
luci.languages.cs='Čeština (Czech)'
luci.languages.de='Deutsch (German)'
luci.languages.el='Ελληνικά (Greek)'
luci.languages.en='English'
luci.languages.es='Español (Spanish)'
luci.languages.fi='Suomi (Finnish)'
luci.languages.fr='Français (French)'
luci.languages.he='עִבְרִית (Hebrew)'
luci.languages.hi='हिंदी (Hindi)'
luci.languages.hu='Magyar (Hungarian)'
luci.languages.it='Italiano (Italian)'
luci.languages.ja='日本語 (Japanese)'
luci.languages.ko='한국어 (Korean)'
luci.languages.mr='Marāṭhī (Marathi)'
luci.languages.ms='Bahasa Melayu (Malay)'
luci.languages.no='Norsk (Norwegian)'
luci.languages.pl='Polski (Polish)'
luci.languages.pt='Português (Portuguese)'
luci.languages.pt_br='Português do Brasil (Brazilian Portuguese)'
luci.languages.ro='Română (Romanian)'
luci.languages.ru='Русский (Russian)'
luci.languages.sk='Slovenčina (Slovak)'
luci.languages.sv='Svenska (Swedish)'
luci.languages.tr='Türkçe (Turkish)'
luci.languages.uk='Українська (Ukrainian)'
luci.languages.vi='Tiếng Việt (Vietnamese)'
luci.languages.zh_cn='简体中文 (Chinese Simplified)'
luci.languages.zh_tw='繁體中文 (Chinese Traditional)'
luci.sauth=internal
luci.sauth.sessionpath='/tmp/luci-sessions'
luci.sauth.sessiontime='3600'
luci.ccache=internal
luci.ccache.enable='1'
luci.themes=internal
luci.themes.Argon='/luci-static/argon'
luci.themes.OpenMPTCProuter='/luci-static/openmptcprouter'
luci.apply=internal
luci.apply.rollback='90'
luci.apply.holdoff='4'
luci.apply.display='1.5'
luci.apply.timeout='20'
luci.diag=internal
luci.diag.ping='openmptcprouter.com'
luci.diag.dns='openmptcprouter.com'
luci.diag.route='openmptcprouter.com'
luci.diag.iperf3='ping-ams1.online.net'
luci.diag.getip='ip.openmptcprouter.com'
macvlan.wan1=macvlan
macvlan.wan1.name='wan1'
macvlan.wan1.ifname='eth0'
macvlan.wan2=macvlan
macvlan.wan2.name='wan2'
macvlan.wan2.ifname='eth0'
mail.default=smtp
mlvpn.general=mlvpn
mlvpn.general.enable='0'
mlvpn.general.timeout='30'
mlvpn.general.reorder_buffer_size='128'
mlvpn.general.loss_tolerence='50'
mlvpn.general.mode='client'
mlvpn.general.firstport='65201'
mlvpn.general.interface_name='mlvpn0'
mlvpn.general.host='27.112.X.X'
mlvpn.general.password='lpjx8dQvpzDYXS3CVdx1fnJWgDmKA0QyIcQDGvf3Wf4='
network.loopback=interface
network.loopback.ifname='lo'
network.loopback.proto='static'
network.loopback.ipaddr='127.0.0.1'
network.loopback.netmask='255.0.0.0'
network.loopback.multipath='off'
network.loopback.macaddr='00:00:00:00:00:00'
network.loopback.metric='5'
network.globals=globals
network.globals.ula_prefix='fdd9:b818:2f3e::/48'
network.globals.multipath='enable'
network.globals.mptcp_path_manager='fullmesh'
network.globals.mptcp_scheduler='blest'
network.globals.congestion='cubic'
network.globals.mptcp_checksum='0'
network.globals.mptcp_debug='0'
network.globals.mptcp_syn_retries='2'
network.globals.mptcp_fullmesh_num_subflows='1'
network.globals.mptcp_fullmesh_create_on_err='1'
network.globals.mptcp_ndiffports_num_subflows='1'
network.lan=interface
network.lan.ifname='eth0'
network.lan.proto='static'
network.lan.netmask='255.255.255.0'
network.lan.ip6assign='60'
network.lan.ipv6='0'
network.lan.delegate='0'
network.lan.multipath='off'
network.lan.ip4table='lan'
network.lan.macaddr='00:15:5d:02:a2:00'
network.lan.metric='6'
network.lan.addlatency='0'
network.lan.ipaddr='192.168.120.1'
network.lan.defaultroute='0'
network.lan.peerdns='0'
network.wan1=interface
network.wan1.ifname='eth1'
network.wan1.ip4table='wan'
network.wan1.multipath='master'
network.wan1.defaultroute='0'
network.wan1.macaddr='00:15:5d:02:a2:01'
network.wan1.peerdns='0'
network.wan1.ipv6='0'
network.wan1.metric='7'
network.wan1.label='WAN1'
network.wan1.proto='dhcp'
network.wan2=interface
network.wan2.ifname='eth2'
network.wan2.ip4table='wan'
network.wan2.defaultroute='0'
network.wan2.macaddr='00:15:5d:02:a2:02'
network.wan2.ipv6='0'
network.wan2.metric='8'
network.wan2.peerdns='0'
network.wan2.label='WAN2'
network.wan2.proto='dhcp'
network.wan2.multipath='on'
network.wan3=interface
network.wan3.ifname='eth3'
network.wan3.ip4table='wan'
network.wan3.defaultroute='0'
network.wan3.macaddr='00:15:5d:02:a2:03'
network.wan3.metric='9'
network.wan3.peerdns='0'
network.wan3.ipv6='0'
network.wan3.label='WAN3'
network.wan3.proto='dhcp'
network.wan3.multipath='off'
network.lan_rule=rule
network.lan_rule.lookup='lan'
network.lan_rule.priority='100'
network.omrvpn=interface
network.omrvpn.ifname='tun0'
network.omrvpn.ip4table='vpn'
network.omrvpn.multipath='off'
network.omrvpn.leasetime='12h'
network.omrvpn.type='tunnel'
network.omrvpn.txqueuelen='100'
network.omrvpn.metric='1200'
network.omrvpn.ipv6='0'
network.omrvpn.proto='none'
network.omr6in4=interface
network.omr6in4.proto='6in4'
network.omr6in4.ip4table='vpn'
network.omr6in4.multipath='off'
network.omr6in4.ipaddr='10.255.255.2'
network.omr6in4.peeraddr='10.255.255.1'
network.omr6in4.gateway='fe80::a00:1'
network.omr6in4.ip6addr='fe80::a00:2/128'
network.omr6in4.auto='0'
network.omr6in4.metric='1201'
network.ovpnwan3=interface
network.ovpnwan3.ifname='tun9'
network.ovpnwan3.defaultroute='0'
network.ovpnwan3.peerdns='0'
network.ovpnwan3.proto='none'
network.ovpnwan3.ip4table='wan'
network.ovpnwan3.multipath='on'
network.ovpnwan3.metric='10'
network.ovpnwan3.ipv6='0'
omr-bypass.all=interface
omr-bypass.m6replay=proto
omr-bypass.m6replay.url='m6web.fr' '6play.fr' '6cloud.fr'
omr-bypass.mycanal=proto
omr-bypass.mycanal.url='mycanal.fr' 'canal-plus.com' 'canalplus.com' 'canalplus-cdn.net' 'canalplus.pro' 'canal-plus.net'
omr-bypass.minecraft=proto
omr-bypass.minecraft.url='authserver.mojang.com'
omr-bypass.lesnumeriques=proto
omr-bypass.lesnumeriques.url='lesnumeriques.com' 'botscorner.com' 'app.botscorner.com'
omr-bypass.disneyplus=proto
omr-bypass.disneyplus.url='bamgrid.com' 'disney-plus.net'
omr-bypass.lo=interface
omr-bypass.lo.id='5'
omr-bypass.eth0=interface
omr-bypass.eth0.id='6'
omr-bypass.wan1=interface
omr-bypass.wan1.id='3'
omr-bypass.wan2=interface
omr-bypass.wan2.id='4'
omr-bypass.tun0=interface
omr-bypass.tun0.id='1200'
omr-bypass.eth3=interface
omr-bypass.eth3.id='9'
omr-bypass.eth1=interface
omr-bypass.eth1.id='7'
omr-bypass.eth2=interface
omr-bypass.eth2.id='8'
omr-bypass.tun8=interface
omr-bypass.tun8.id='10'
omr-bypass.tun9=interface
omr-bypass.tun9.id='10'
omr-quota.wan1=interface
omr-quota.wan1.enabled='0'
omr-quota.wan1.txquota='100000'
omr-quota.wan1.rxquota='400000'
omr-quota.wan1.ttquota='500000'
omr-quota.wan1.interval='10'
omr-quota.wan1.interface='wan1'
omr-quota.wan2=interface
omr-quota.wan2.enabled='0'
omr-quota.wan2.txquota='100000'
omr-quota.wan2.rxquota='400000'
omr-quota.wan2.ttquota='500000'
omr-quota.wan2.interval='10'
omr-quota.wan2.interface='wan2'
omr-tracker.defaults=defaults
omr-tracker.defaults.enabled='1'
omr-tracker.defaults.hosts='4.2.2.1' '8.8.8.8' '80.67.169.12' '8.8.4.4' '9.9.9.9' '1.0.0.1' '114.114.115.115' '1.2.4.8' '80.67.169.40' '114.114.114.114' '1.1.1.1'
omr-tracker.defaults.timeout='2'
omr-tracker.defaults.tries='3'
omr-tracker.defaults.interval='2'
omr-tracker.defaults.interval_tries='1'
omr-tracker.defaults.type='ping'
omr-tracker.defaults.wait_test='0'
omr-tracker.proxy=proxy
omr-tracker.proxy.enabled='1'
omr-tracker.proxy.hosts='1.0.0.1' '212.27.48.10' '198.27.92.1' '151.101.129.164' '77.88.55.77' '1.1.1.1' '74.82.42.42' '176.103.130.130'
omr-tracker.proxy.timeout='10'
omr-tracker.proxy.tries='3'
omr-tracker.proxy.wait_test='0'
omr-tracker.proxy.interval_tries='1'
omr-tracker.proxy.interval='5'
omr-tracker.server=server
omr-tracker.server.enabled='1'
omr-tracker.server.tries='3'
omr-tracker.server.timeout='10'
omr-tracker.server.wait_test='0'
omr-tracker.server.interval='5'
omr-tracker.omrvpn=interface
omr-tracker.omrvpn.type='none'
omr-tracker.omrvpn.timeout='6'
omr-tracker.omrvpn.tries='2'
omr-tracker.omrvpn.interval='4'
omr-tracker.omrvpn.mail_alert='0'
omr-tracker.omrvpn.enabled='1'
openmptcprouter.settings=settings
openmptcprouter.settings.enabled='1'
openmptcprouter.settings.version='0.57.3'
openmptcprouter.settings.master='balancing'
openmptcprouter.settings.disable_ipv6='1'
openmptcprouter.settings.check_ipv4_website='http://ip.openmptcprouter.com'
openmptcprouter.settings.check_ipv6_website='http://ipv6.openmptcprouter.com'
openmptcprouter.settings.status_vps_timeout='2'
openmptcprouter.settings.status_getip_timeout='2'
openmptcprouter.settings.enable_nodelay='1'
openmptcprouter.settings.scaling_governor='performance'
openmptcprouter.settings.menu='OpenMPTCProuter'
openmptcprouter.settings.serial='9968-3165-5256-3618-9642-8372-84'
openmptcprouter.settings.proxy='shadowsocks'
openmptcprouter.settings.ha='0'
openmptcprouter.settings.vpn='glorytun_tcp'
openmptcprouter.settings.firstboot='0'
openmptcprouter.settings.disable_fastopen='0'
openmptcprouter.settings.external_check='1'
openmptcprouter.settings.debug='0'
openmptcprouter.settings.disablegwping='0'
openmptcprouter.settings.disableintfrename='0'
openmptcprouter.settings.defaultgw='1'
openmptcprouter.settings.tracebox='1'
openmptcprouter.settings.disableserverping='0'
openmptcprouter.settings.shadowsocksudp='0'
openmptcprouter.settings.vnstat_backup='0'
openmptcprouter.settings.apilc='1619676899'
openmptcprouter.vps=server
openmptcprouter.vps.username='openmptcprouter'
openmptcprouter.vps.master='1'
openmptcprouter.vps.backup='0'
openmptcprouter.vps.port='65500'
openmptcprouter.vps.pihole='0'
openmptcprouter.vps.kernel='5.4.86-mptcp'
openmptcprouter.vps.machine='x86_64'
openmptcprouter.vps.omr_version='0.1024'
openmptcprouter.vps.nofwredirect='1'
openmptcprouter.vps.password='5EC5EB1A4CCAD88910BD15656659AEC07032CB3621C48D1994F3DFA6DBC8C67A'
openmptcprouter.vps.ip='27.112.X.X'
openmptcprouter.vps.redirect_ports='0'
openmptcprouter.vps.available_vpn='glorytun_tcp' 'glorytun_udp' 'dsvpn' 'openvpn' 'openvpn_bonding' 'mlvpn'
openmptcprouter.vps.get_config='0'
openmptcprouter.vps.admin_error='0'
openmptcprouter.vps.token='eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJvcGVubXB0Y3Byb3V0ZXIiLCJleHAiOjE2MTY0MTY0NTN9.fajuHdHSjI86kjLC9AJYRVDiSwsar9SJgwpeJ7aTh00'
openmptcprouter.vps.lastchange='1616330055'
openmptcprouter.omr=router
openmptcprouter.omr.shadowsocks='up'
openmptcprouter.omr.detected_public_ipv4='27.112.X.X'
openmptcprouter.omr.detected_ss_ipv4='27.112.X.X'
openmptcprouter.omrvpn=interface
openmptcprouter.omrvpn.multipath='off'
openmptcprouter.omrvpn.metric='1200'
openmptcprouter.loopback=interface
openmptcprouter.loopback.multipath='off'
openmptcprouter.loopback.metric='5'
openmptcprouter.lan=interface
openmptcprouter.lan.multipath='off'
openmptcprouter.lan.metric='6'
openmptcprouter.lan.multipathvpn='0'
openmptcprouter.omr6in4=interface
openmptcprouter.omr6in4.multipath='off'
openmptcprouter.omr6in4.metric='1201'
openmptcprouter.latest_versions=latest_versions
openmptcprouter.latest_versions.omr='0.57.3'
openmptcprouter.latest_versions.vps='0.1024'
openmptcprouter.latest_versions.lc='1616326505'
openmptcprouter.wan2=interface
openmptcprouter.wan2.metric='8'
openmptcprouter.wan2.mptcp_status='MPTCP enabled'
openmptcprouter.wan2.multipath='on'
openmptcprouter.wan2.multipathvpn='0'
openmptcprouter.wan2.state='up'
openmptcprouter.wan2.publicip='125.161.131.1'
openmptcprouter.wan2.asn='TLKM_D2_BB_SPEEDY_KBB'
openmptcprouter.wan2.manufacturer='huawei'
openmptcprouter.wan2.lc='1616329893'
openmptcprouter.wan2.latency_previous='7'
openmptcprouter.wan2.latency='238'
openmptcprouter.wan1=interface
openmptcprouter.wan1.multipath='master'
openmptcprouter.wan1.multipathvpn='0'
openmptcprouter.wan1.metric='7'
openmptcprouter.wan1.mptcp_status='MPTCP enabled'
openmptcprouter.wan1.asn='BM-ID'
openmptcprouter.wan1.publicip='118.137.182.120'
openmptcprouter.wan1.manufacturer='huawei'
openmptcprouter.wan1.state='up'
openmptcprouter.wan1.lc='1616329869'
openmptcprouter.wan1.latency_previous='17'
openmptcprouter.wan1.latency='22'
openmptcprouter.wan3=interface
openmptcprouter.wan3.metric='9'
openmptcprouter.wan3.mptcp_status='MPTCP enabled'
openmptcprouter.wan3.asn='TELKOMSEL-ID'
openmptcprouter.wan3.manufacturer='huawei'
openmptcprouter.wan3.state='up'
openmptcprouter.wan3.publicip='114.124.200.156'
openmptcprouter.wan3.multipathvpn='1'
openmptcprouter.wan3.lc='1616329858'
openmptcprouter.wan3.multipath='off'
openmptcprouter.wan3.latency_previous='49'
openmptcprouter.wan3.latency='35'
openmptcprouter.ovpnwan3=interface
openmptcprouter.ovpnwan3.multipath='on'
openmptcprouter.ovpnwan3.vpn='1'
openmptcprouter.ovpnwan3.baseintf='wan3'
openmptcprouter.ovpnwan3.metric='10'
openmptcprouter.ovpnwan3.state='up'
openmptcprouter.ovpnwan3.lc='1616330419'
openmptcprouter.ovpnwan3.latency_previous='223'
openmptcprouter.ovpnwan3.latency='70'
openvpn.custom_config=openvpn
openvpn.custom_config.enabled='0'
openvpn.custom_config.config='/etc/openvpn/my-vpn.conf'
openvpn.sample_server=openvpn
openvpn.sample_server.enabled='0'
openvpn.sample_server.port='1194'
openvpn.sample_server.proto='udp'
openvpn.sample_server.dev='tun'
openvpn.sample_server.ca='/etc/openvpn/ca.crt'
openvpn.sample_server.cert='/etc/openvpn/server.crt'
openvpn.sample_server.key='/etc/openvpn/server.key'
openvpn.sample_server.dh='/etc/openvpn/dh2048.pem'
openvpn.sample_server.server='10.8.0.0 255.255.255.0'
openvpn.sample_server.ifconfig_pool_persist='/tmp/ipp.txt'
openvpn.sample_server.keepalive='10 120'
openvpn.sample_server.persist_key='1'
openvpn.sample_server.persist_tun='1'
openvpn.sample_server.user='nobody'
openvpn.sample_server.status='/tmp/openvpn-status.log'
openvpn.sample_server.verb='3'
openvpn.sample_client=openvpn
openvpn.sample_client.enabled='0'
openvpn.sample_client.client='1'
openvpn.sample_client.dev='tun'
openvpn.sample_client.proto='udp'
openvpn.sample_client.remote='my_server_1 1194'
openvpn.sample_client.resolv_retry='infinite'
openvpn.sample_client.nobind='1'
openvpn.sample_client.persist_key='1'
openvpn.sample_client.persist_tun='1'
openvpn.sample_client.user='nobody'
openvpn.sample_client.ca='/etc/openvpn/ca.crt'
openvpn.sample_client.cert='/etc/openvpn/client.crt'
openvpn.sample_client.key='/etc/openvpn/client.key'
openvpn.sample_client.verb='3'
openvpn.omr=openvpn
openvpn.omr.dev='tun0'
openvpn.omr.port='65301'
openvpn.omr.cipher='AES-256-CBC'
openvpn.omr.proto='tcp-client'
openvpn.omr.enabled='0'
openvpn.omr.ncp_disable='1'
openvpn.omr.auth_nocache='1'
openvpn.omr.client='1'
openvpn.omr.tls_client='1'
openvpn.omr.reneg_sec='0'
openvpn.omr.allow_recursive_routing='1'
openvpn.omr.sndbuf='0'
openvpn.omr.rcvbuf='0'
openvpn.omr.route_delay='5'
openvpn.omr.key='/etc/luci-uploads/client.key'
openvpn.omr.cert='/etc/luci-uploads/client.crt'
openvpn.omr.ca='/etc/luci-uploads/ca.crt'
openvpn.omr.remote='27.112.X.X'
openvpn.wan3=openvpn
openvpn.wan3.dev='tun9'
openvpn.wan3.cipher='AES-256-CBC'
openvpn.wan3.port='65301'
openvpn.wan3.remote='27.112.X.X'
openvpn.wan3.local='192.168.18.120'
openvpn.wan3.lport='0'
openvpn.wan3.ncp_disable='1'
openvpn.wan3.auth_nocache='1'
openvpn.wan3.proto='udp'
openvpn.wan3.client='1'
openvpn.wan3.enabled='1'
openvpn.wan3.allow_recursive_routing='1'
openvpn.wan3.key='/etc/luci-uploads/client.key'
openvpn.wan3.cert='/etc/luci-uploads/client.crt'
openvpn.wan3.ca='/etc/luci-uploads/ca.crt'
openvpn_recipes.server_tun_ptp=openvpn_recipe
openvpn_recipes.server_tun_ptp._description='Simple server configuration for a routed point-to-point VPN'
openvpn_recipes.server_tun_ptp._role='server'
openvpn_recipes.server_tun_ptp.dev='tun'
openvpn_recipes.server_tun_ptp.ifconfig='10.0.0.1 10.0.0.2'
openvpn_recipes.server_tun_ptp.secret='shared-secret.key'
openvpn_recipes.server_tun_ptp.keepalive='10 60'
openvpn_recipes.server_tun_ptp.comp_lzo='yes'
openvpn_recipes.server_tun_ptp.verb='3'
openvpn_recipes.server_tun_ptp.mssfix='1420'
openvpn_recipes.client_tun_ptp=openvpn_recipe
openvpn_recipes.client_tun_ptp._description='Simple client configuration for a routed point-to-point VPN'
openvpn_recipes.client_tun_ptp._role='client'
openvpn_recipes.client_tun_ptp.dev='tun'
openvpn_recipes.client_tun_ptp.remote='vpnserver.example.org'
openvpn_recipes.client_tun_ptp.ifconfig='10.0.0.2 10.0.0.1'
openvpn_recipes.client_tun_ptp.secret='shared-secret.key'
openvpn_recipes.client_tun_ptp.nobind='1'
openvpn_recipes.client_tun_ptp.comp_lzo='yes'
openvpn_recipes.client_tun_ptp.verb='3'
openvpn_recipes.server_tun=openvpn_recipe
openvpn_recipes.server_tun._description='Server configuration for a routed multi-client VPN'
openvpn_recipes.server_tun._role='server'
openvpn_recipes.server_tun.dev='tun'
openvpn_recipes.server_tun.server='10.0.100.0 255.255.255.0'
openvpn_recipes.server_tun.ca='ca.crt'
openvpn_recipes.server_tun.cert='server.crt'
openvpn_recipes.server_tun.key='server.key'
openvpn_recipes.server_tun.dh='dh1024.pem'
openvpn_recipes.server_tun.keepalive='10 60'
openvpn_recipes.server_tun.comp_lzo='yes'
openvpn_recipes.server_tun.verb='3'
openvpn_recipes.server_tun.mssfix='1420'
openvpn_recipes.client_tun=openvpn_recipe
openvpn_recipes.client_tun._description='Client configuration for a routed multi-client VPN'
openvpn_recipes.client_tun._role='client'
openvpn_recipes.client_tun.client='1'
openvpn_recipes.client_tun.dev='tun'
openvpn_recipes.client_tun.remote='vpnserver.example.org'
openvpn_recipes.client_tun.pkcs12='my_client.p12'
openvpn_recipes.client_tun.remote_cert_tls='server'
openvpn_recipes.client_tun.comp_lzo='yes'
openvpn_recipes.client_tun.nobind='1'
openvpn_recipes.client_tun.persist_key='1'
openvpn_recipes.client_tun.persist_tun='1'
openvpn_recipes.client_tun.verb='3'
openvpn_recipes.client_tun.reneg_sec='0'
openvpn_recipes.client_tun.float='1'
openvpn_recipes.server_tap_bridge=openvpn_recipe
openvpn_recipes.server_tap_bridge._description='Server configuration for an ethernet bridge VPN'
openvpn_recipes.server_tap_bridge._role='server'
openvpn_recipes.server_tap_bridge.dev='tap'
openvpn_recipes.server_tap_bridge.server_bridge='192.168.1.1 255.255.255.0 192.168.1.128 192.168.1.254'
openvpn_recipes.server_tap_bridge.ca='ca.crt'
openvpn_recipes.server_tap_bridge.cert='server.crt'
openvpn_recipes.server_tap_bridge.key='server.key'
openvpn_recipes.server_tap_bridge.dh='dh1024.pem'
openvpn_recipes.server_tap_bridge.keepalive='10 60'
openvpn_recipes.server_tap_bridge.comp_lzo='yes'
openvpn_recipes.server_tap_bridge.verb='3'
openvpn_recipes.server_tap_bridge.mssfix='1420'
openvpn_recipes.client_tap_bridge=openvpn_recipe
openvpn_recipes.client_tap_bridge._description='Client configuration for an ethernet bridge VPN'
openvpn_recipes.client_tap_bridge._role='client'
openvpn_recipes.client_tap_bridge.client='1'
openvpn_recipes.client_tap_bridge.dev='tap'
openvpn_recipes.client_tap_bridge.remote='vpnserver.example.org'
openvpn_recipes.client_tap_bridge.ca='ca.crt'
openvpn_recipes.client_tap_bridge.cert='my_client.crt'
openvpn_recipes.client_tap_bridge.key='my_client.key'
openvpn_recipes.client_tap_bridge.dh='dh1024.pem'
openvpn_recipes.client_tap_bridge.remote_cert_tls='server'
openvpn_recipes.client_tap_bridge.comp_lzo='yes'
openvpn_recipes.client_tap_bridge.nobind='1'
openvpn_recipes.client_tap_bridge.persist_key='1'
openvpn_recipes.client_tap_bridge.verb='3'
openvpn_recipes.client_tap_bridge.reneg_sec='0'
openvpn_recipes.client_tap_bridge.float='1'
packet_capture.@tcpdump[0]=tcpdump
rpcd.@rpcd[0]=rpcd
rpcd.@rpcd[0].socket='/var/run/ubus/ubus.sock'
rpcd.@rpcd[0].timeout='120'
rpcd.@login[0]=login
rpcd.@login[0].username='root'
rpcd.@login[0].password='$p$root'
rpcd.@login[0].read=''
rpcd.@login[0].write='
'
shadowsocks-libev.hi=ss_redir
shadowsocks-libev.hi.server='sss0'
shadowsocks-libev.hi.local_address='::'
shadowsocks-libev.hi.local_port='1100'
shadowsocks-libev.hi.mode='tcp_and_udp'
shadowsocks-libev.hi.timeout='1000'
shadowsocks-libev.hi.fast_open='1'
shadowsocks-libev.hi.verbose='0'
shadowsocks-libev.hi.syslog='1'
shadowsocks-libev.hi.reuse_port='1'
shadowsocks-libev.hi.mptcp='1'
shadowsocks-libev.hi.ipv6_first='1'
shadowsocks-libev.hi.no_delay='1'
shadowsocks-libev.hi.ebpf='0'
shadowsocks-libev.hi2=ss_redir
shadowsocks-libev.hi2.server='sss0'
shadowsocks-libev.hi2.local_address='0.0.0.0'
shadowsocks-libev.hi2.local_port='1100'
shadowsocks-libev.hi2.mode='tcp_and_udp'
shadowsocks-libev.hi2.timeout='1000'
shadowsocks-libev.hi2.fast_open='1'
shadowsocks-libev.hi2.verbose='0'
shadowsocks-libev.hi2.syslog='1'
shadowsocks-libev.hi2.reuse_port='1'
shadowsocks-libev.hi2.mptcp='1'
shadowsocks-libev.hi2.ipv6_first='1'
shadowsocks-libev.hi2.no_delay='1'
shadowsocks-libev.hi2.ebpf='0'
shadowsocks-libev.ss_rules=ss_rules
shadowsocks-libev.ss_rules.disabled='0'
shadowsocks-libev.ss_rules.redir_tcp='hi'
shadowsocks-libev.ss_rules.src_default='forward'
shadowsocks-libev.ss_rules.dst_default='forward'
shadowsocks-libev.ss_rules.local_default='forward'
shadowsocks-libev.ss_rules.server='sss0'
shadowsocks-libev.sss0=server
shadowsocks-libev.sss0.server_port='65101'
shadowsocks-libev.sss0.method='chacha20-ietf-poly1305'
shadowsocks-libev.sss0.obfs='0'
shadowsocks-libev.sss0.disabled='0'
shadowsocks-libev.sss0.server='27.112.X.X'
shadowsocks-libev.sss0.key='p+CKhR9S3je8sXVu6saAM3qVG1UA9IUT29oQJ1HdM3Y='
shadowsocks-libev.sss0.obfs_host='27.112.X.X'
shadowsocks-libev.dns=ss_tunnel
shadowsocks-libev.dns.disabled='1'
shadowsocks-libev.dns.mode='tcp_and_udp'
shadowsocks-libev.dns.server='sss0'
shadowsocks-libev.dns.local_port='5353'
shadowsocks-libev.dns.tunnel_address='8.8.8.8:53'
shadowsocks-libev.tracker=ss_local
shadowsocks-libev.tracker.server='sss0'
shadowsocks-libev.tracker.local_address='127.0.0.1'
shadowsocks-libev.tracker.local_port='1111'
shadowsocks-libev.tracker.mode='tcp_and_udp'
shadowsocks-libev.tracker.timeout='600'
shadowsocks-libev.tracker.fast_open='1'
shadowsocks-libev.tracker.syslog='0'
shadowsocks-libev.tracker.reuse_port='1'
shadowsocks-libev.tracker.mptcp='1'
shadowsocks-libev.tracker.verbose='0'
shadowsocks-libev.tracker.no_delay='1'
shadowsocks-libev.tracker.ebpf='0'
shadowsocks-libev.mptcpovervpn=server
shadowsocks-libev.mptcpovervpn.server_port='65101'
shadowsocks-libev.mptcpovervpn.key='p+CKhR9S3je8sXVu6saAM3qVG1UA9IUT29oQJ1HdM3Y='
shadowsocks-libev.mptcpovervpn.method='chacha20-ietf-poly1305'
shadowsocks-libev.mptcpovervpn.server='10.255.250.1'
shadowsocks-libev.hivpn1=ss_redir
shadowsocks-libev.hivpn1.server='mptcpovervpn'
shadowsocks-libev.hivpn1.local_address='0.0.0.0'
shadowsocks-libev.hivpn1.local_port='1101'
shadowsocks-libev.hivpn1.mode='tcp_and_udp'
shadowsocks-libev.hivpn1.timeout='1000'
shadowsocks-libev.hivpn1.fast_open='1'
shadowsocks-libev.hivpn1.verbose='0'
shadowsocks-libev.hivpn1.syslog='1'
shadowsocks-libev.hivpn1.reuse_port='1'
shadowsocks-libev.hivpn1.mptcp='1'
shadowsocks-libev.hivpn1.ipv6_first='1'
shadowsocks-libev.hivpn1.no_delay='1'
shadowsocks-libev.hivpn2=ss_redir
shadowsocks-libev.hivpn2.server='mptcpovervpn'
shadowsocks-libev.hivpn2.local_address='0.0.0.0'
shadowsocks-libev.hivpn2.local_port='1101'
shadowsocks-libev.hivpn2.mode='tcp_and_udp'
shadowsocks-libev.hivpn2.timeout='1000'
shadowsocks-libev.hivpn2.fast_open='1'
shadowsocks-libev.hivpn2.verbose='0'
shadowsocks-libev.hivpn2.syslog='1'
shadowsocks-libev.hivpn2.reuse_port='1'
shadowsocks-libev.hivpn2.mptcp='1'
shadowsocks-libev.hivpn2.ipv6_first='1'
shadowsocks-libev.hivpn2.no_delay='1'
shadowsocks-libev.hivpn3=ss_redir
shadowsocks-libev.hivpn3.server='mptcpovervpn'
shadowsocks-libev.hivpn3.local_address='0.0.0.0'
shadowsocks-libev.hivpn3.local_port='1101'
shadowsocks-libev.hivpn3.mode='tcp_and_udp'
shadowsocks-libev.hivpn3.timeout='1000'
shadowsocks-libev.hivpn3.fast_open='1'
shadowsocks-libev.hivpn3.verbose='0'
shadowsocks-libev.hivpn3.syslog='1'
shadowsocks-libev.hivpn3.reuse_port='1'
shadowsocks-libev.hivpn3.mptcp='1'
shadowsocks-libev.hivpn3.ipv6_first='1'
shadowsocks-libev.hivpn3.no_delay='1'
shadowsocks-libev.hivpn4=ss_redir
shadowsocks-libev.hivpn4.server='mptcpovervpn'
shadowsocks-libev.hivpn4.local_address='0.0.0.0'
shadowsocks-libev.hivpn4.local_port='1101'
shadowsocks-libev.hivpn4.mode='tcp_and_udp'
shadowsocks-libev.hivpn4.timeout='1000'
shadowsocks-libev.hivpn4.fast_open='1'
shadowsocks-libev.hivpn4.verbose='0'
shadowsocks-libev.hivpn4.syslog='1'
shadowsocks-libev.hivpn4.reuse_port='1'
shadowsocks-libev.hivpn4.mptcp='1'
shadowsocks-libev.hivpn4.ipv6_first='1'
shadowsocks-libev.hivpn4.no_delay='1'
snmpd.@agent[0]=agent
snmpd.@agent[0].agentaddress='UDP:161,UDP6:161'
snmpd.@AgentX[0]=agentx
snmpd.@AgentX[0].agentxsocket='/var/run/agentx.sock'
snmpd.public=com2sec
snmpd.public.secname='ro'
snmpd.public.source='default'
snmpd.public.community='public'
snmpd.private=com2sec
snmpd.private.secname='rw'
snmpd.private.source='localhost'
snmpd.private.community='private'
snmpd.public_v1=group
snmpd.public_v1.group='public'
snmpd.public_v1.version='v1'
snmpd.public_v1.secname='ro'
snmpd.public_v2c=group
snmpd.public_v2c.group='public'
snmpd.public_v2c.version='v2c'
snmpd.public_v2c.secname='ro'
snmpd.public_usm=group
snmpd.public_usm.group='public'
snmpd.public_usm.version='usm'
snmpd.public_usm.secname='ro'
snmpd.private_v1=group
snmpd.private_v1.group='private'
snmpd.private_v1.version='v1'
snmpd.private_v1.secname='rw'
snmpd.private_v2c=group
snmpd.private_v2c.group='private'
snmpd.private_v2c.version='v2c'
snmpd.private_v2c.secname='rw'
snmpd.private_usm=group
snmpd.private_usm.group='private'
snmpd.private_usm.version='usm'
snmpd.private_usm.secname='rw'
snmpd.all=view
snmpd.all.viewname='all'
snmpd.all.type='included'
snmpd.all.oid='.1'
snmpd.public_access=access
snmpd.public_access.group='public'
snmpd.public_access.context='none'
snmpd.public_access.version='any'
snmpd.public_access.level='noauth'
snmpd.public_access.prefix='exact'
snmpd.public_access.read='all'
snmpd.public_access.write='none'
snmpd.public_access.notify='none'
snmpd.private_access=access
snmpd.private_access.group='private'
snmpd.private_access.context='none'
snmpd.private_access.version='any'
snmpd.private_access.level='noauth'
snmpd.private_access.prefix='exact'
snmpd.private_access.read='all'
snmpd.private_access.write='all'
snmpd.private_access.notify='all'
snmpd.@System[0]=system
snmpd.@System[0].sysLocation='office'
snmpd.@System[0].sysContact='bofh@example.com'
snmpd.@System[0].sysName='OpenMPTCProuter'
snmpd.@exec[0]=exec
snmpd.@exec[0].name='filedescriptors'
snmpd.@exec[0].prog='/bin/cat'
snmpd.@exec[0].args='/proc/sys/fs/file-nr'
snmpd.@engineid[0]=engineid
snmpd.@engineid[0].engineidtype='3'
snmpd.@engineid[0].engineidnic='eth0'
snmpd.general=snmpd
snmpd.general.network='lan'
snmpd.general.enabled='0'
snmpd.general.ipv6cpipv4='1'
sqm.eth1=queue
sqm.eth1.enabled='0'
sqm.eth1.interface='eth1'
sqm.eth1.download='85000'
sqm.eth1.upload='10000'
sqm.eth1.qdisc='fq_codel'
sqm.eth1.script='simple.qos'
sqm.eth1.qdisc_advanced='0'
sqm.eth1.ingress_ecn='ECN'
sqm.eth1.egress_ecn='ECN'
sqm.eth1.qdisc_really_really_advanced='0'
sqm.eth1.itarget='auto'
sqm.eth1.etarget='auto'
sqm.eth1.linklayer='none'
sqm.lan=queue
sqm.lan.interface='eth0'
sqm.lan.qdisc='fq_codel'
sqm.lan.script='simple.qos'
sqm.lan.qdisc_advanced='0'
sqm.lan.linklayer='none'
sqm.lan.enabled='0'
sqm.lan.debug_logging='0'
sqm.lan.verbosity='5'
sqm.lan.download='0'
sqm.lan.upload='0'
sqm.lan.iqdisc_opts='autorate-ingress nat dual-dsthost'
sqm.lan.eqdisc_opts='nat dual-srchost'
sqm.wan4=queue
sqm.wan4.qdisc='fq_codel'
sqm.wan4.script='simple.qos'
sqm.wan4.qdisc_advanced='0'
sqm.wan4.linklayer='none'
sqm.wan4.enabled='0'
sqm.wan4.debug_logging='0'
sqm.wan4.verbosity='5'
sqm.wan4.download='0'
sqm.wan4.upload='0'
sqm.wan4.iqdisc_opts='autorate-ingress nat dual-dsthost'
sqm.wan4.eqdisc_opts='nat dual-srchost'
sqm.wan1=queue
sqm.wan1.qdisc='fq_codel'
sqm.wan1.script='simple.qos'
sqm.wan1.qdisc_advanced='0'
sqm.wan1.linklayer='none'
sqm.wan1.enabled='0'
sqm.wan1.debug_logging='0'
sqm.wan1.verbosity='5'
sqm.wan1.download='0'
sqm.wan1.upload='0'
sqm.wan1.iqdisc_opts='autorate-ingress nat dual-dsthost'
sqm.wan1.eqdisc_opts='nat dual-srchost'
sqm.wan1.interface='eth1'
sqm.wan2=queue
sqm.wan2.qdisc='fq_codel'
sqm.wan2.script='simple.qos'
sqm.wan2.qdisc_advanced='0'
sqm.wan2.linklayer='none'
sqm.wan2.enabled='0'
sqm.wan2.debug_logging='0'
sqm.wan2.verbosity='5'
sqm.wan2.download='0'
sqm.wan2.upload='0'
sqm.wan2.iqdisc_opts='autorate-ingress nat dual-dsthost'
sqm.wan2.eqdisc_opts='nat dual-srchost'
sqm.wan2.interface='eth2'
sqm.wan3=queue
sqm.wan3.interface='eth3'
sqm.wan3.qdisc='fq_codel'
sqm.wan3.script='simple.qos'
sqm.wan3.qdisc_advanced='0'
sqm.wan3.linklayer='none'
sqm.wan3.enabled='0'
sqm.wan3.debug_logging='0'
sqm.wan3.verbosity='5'
sqm.wan3.download='0'
sqm.wan3.upload='0'
sqm.wan3.iqdisc_opts='autorate-ingress nat dual-dsthost'
sqm.wan3.eqdisc_opts='nat dual-srchost'
system.@System[0]=system
system.@System[0].log_size='64'
system.@System[0].urandom_seed='0'
system.@System[0].ttylogin='1'
system.@System[0].hostname='BondingRouter'
system.@System[0].zonename='Asia/Jakarta'
system.@System[0].timezone='WIB-7'
system.@System[0].log_proto='udp'
system.@System[0].conloglevel='8'
system.@System[0].cronloglevel='5'
system.@System[0].zram_comp_algo='lzo'
system.ntp=timeserver
system.ntp.server='0.openwrt.pool.ntp.org' '1.openwrt.pool.ntp.org' '2.openwrt.pool.ntp.org' '3.openwrt.pool.ntp.org'
system.ntp.use_dhcp='0'
system.ntp.enable_server='1'
system.@rngd[0]=rngd
system.@rngd[0].device='/dev/urandom'
system.@rngd[0].enabled='1'
ttyd.@Ttyd[0]=ttyd
ttyd.@Ttyd[0].interface='@lan'
ttyd.@Ttyd[0].command='/usr/libexec/login.sh'
ucitrack.@network[0]=network
ucitrack.@network[0].init='network'
ucitrack.@network[0].affects='dhcp' 'radvd' 'glorytun' 'glorytun-udp' 'dsvpn' 'mptcpovervpn' 'omr6in4' 'omr-quota' 'omr-tracker' 'openmptcprouter'
ucitrack.@wireless[0]=wireless
ucitrack.@wireless[0].affects='network'
ucitrack.@Firewall[0]=firewall
ucitrack.@Firewall[0].init='firewall'
ucitrack.@Firewall[0].affects='luci-splash' 'qos' 'miniupnpd' 'sqm'
ucitrack.@OLSR[0]=olsr
ucitrack.@OLSR[0].init='olsrd'
ucitrack.@dhcp[0]=dhcp
ucitrack.@dhcp[0].init='dnsmasq'
ucitrack.@dhcp[0].affects='odhcpd'
ucitrack.@odhcpd[0]=odhcpd
ucitrack.@odhcpd[0].init='odhcpd'
ucitrack.@dropbear[0]=dropbear
ucitrack.@dropbear[0].init='dropbear'
ucitrack.@httpd[0]=httpd
ucitrack.@httpd[0].init='httpd'
ucitrack.@fstab[0]=fstab
ucitrack.@fstab[0].exec='/sbin/block mount'
ucitrack.@qOs[0]=qos
ucitrack.@qOs[0].init='qos'
ucitrack.@System[0]=system
ucitrack.@System[0].init='led'
ucitrack.@System[0].exec='/etc/init.d/log reload'
ucitrack.@System[0].affects='luci_statistics' 'dhcp'
ucitrack.@luci_splash[0]=luci_splash
ucitrack.@luci_splash[0].init='luci_splash'
ucitrack.@ntpclient[0]=ntpclient
ucitrack.@ntpclient[0].init='ntpclient'
ucitrack.@samba[0]=samba
ucitrack.@samba[0].init='samba'
ucitrack.@tinyproxy[0]=tinyproxy
ucitrack.@tinyproxy[0].init='tinyproxy'
ucitrack.@Glorytun[0]=glorytun
ucitrack.@Glorytun[0].init='glorytun'
ucitrack.@Glorytun[0].affects='glorytun-udp' 'openmptcprouter-vps'
ucitrack.@glorytun-udp[0]=glorytun-udp
ucitrack.@glorytun-udp[0].init='glorytun-udp'
ucitrack.@glorytun-udp[1]=glorytun-udp
ucitrack.@glorytun-udp[1].init='glorytun-udp'
ucitrack.@glorytun-udp[1].affects='openmptcprouter-vps'
ucitrack.@mptcpovervpn[0]=mptcpovervpn
ucitrack.@mptcpovervpn[0].init='mptcpovervpn'
ucitrack.@macvlan[0]=macvlan
ucitrack.@macvlan[0].init='macvlan'
ucitrack.@upnpd[0]=upnpd
ucitrack.@upnpd[0].init='miniupnpd'
ucitrack.@shadowsocks-libev[0]=shadowsocks-libev
ucitrack.@shadowsocks-libev[0].init='shadowsocks-libev'
ucitrack.@shadowsocks-libev[0].affects='omr-tracker'
ucitrack.@mlvpn[0]=mlvpn
ucitrack.@mlvpn[0].init='mlvpn'
ucitrack.@mail[0]=mail
ucitrack.@mail[0].init='mail'
ucitrack.@omr-bypass[0]=omr-bypass
ucitrack.@omr-bypass[0].init='omr-bypass'
ucitrack.@snmpd[0]=snmpd
ucitrack.@snmpd[0].init='snmpd'
ucitrack.@sqm[0]=sqm
ucitrack.@sqm[0].init='sqm'
ucitrack.@mptcp[0]=mptcp
ucitrack.@mptcp[0].init='mptcp'
ucitrack.@omr-quota[0]=omr-quota
ucitrack.@omr-quota[0].init='omr-quota'
ucitrack.@omr-tracker[0]=omr-tracker
ucitrack.@omr-tracker[0].init='omr-tracker'
ucitrack.@openmptcprouter[0]=openmptcprouter
ucitrack.@openmptcprouter[0].init='openmptcprouter'
uhttpd.main=uhttpd
uhttpd.main.listen_http='0.0.0.0:80' '[::]:80'
uhttpd.main.listen_https='0.0.0.0:443' '[::]:443'
uhttpd.main.redirect_https='1'
uhttpd.main.home='/www'
uhttpd.main.rfc1918_filter='1'
uhttpd.main.max_requests='3'
uhttpd.main.max_connections='100'
uhttpd.main.cert='/etc/uhttpd.crt'
uhttpd.main.key='/etc/uhttpd.key'
uhttpd.main.cgi_prefix='/cgi-bin'
uhttpd.main.lua_prefix='/cgi-bin/luci=/usr/lib/lua/luci/sgi/uhttpd.lua'
uhttpd.main.script_timeout='60'
uhttpd.main.network_timeout='30'
uhttpd.main.http_keepalive='20'
uhttpd.main.tcp_keepalive='1'
uhttpd.main.ubus_prefix='/ubus'
uhttpd.defaults=cert
uhttpd.defaults.days='730'
uhttpd.defaults.key_type='ec'
uhttpd.defaults.bits='2048'
uhttpd.defaults.ec_curve='P-256'
uhttpd.defaults.country='ZZ'
uhttpd.defaults.state='Somewhere'
uhttpd.defaults.location='Unknown'
uhttpd.defaults.commonname='openmptcprouter'
unbound.ub_main=unbound
unbound.ub_main.add_extra_dns='0'
unbound.ub_main.add_local_fqdn='1'
unbound.ub_main.add_wan_fqdn='0'
unbound.ub_main.dhcp_link='none'
unbound.ub_main.dhcp4_slaac6='0'
unbound.ub_main.dns64='0'
unbound.ub_main.dns64_prefix='64:ff9b::/96'
unbound.ub_main.domain='lan'
unbound.ub_main.domain_type='static'
unbound.ub_main.edns_size='1232'
unbound.ub_main.extended_stats='0'
unbound.ub_main.hide_binddata='1'
unbound.ub_main.interface_auto='1'
unbound.ub_main.localservice='1'
unbound.ub_main.manual_conf='0'
unbound.ub_main.num_threads='1'
unbound.ub_main.query_minimize='0'
unbound.ub_main.query_min_strict='0'
unbound.ub_main.rate_limit='0'
unbound.ub_main.rebind_localhost='0'
unbound.ub_main.rebind_protection='1'
unbound.ub_main.resource='default'
unbound.ub_main.root_age='9'
unbound.ub_main.ttl_min='120'
unbound.ub_main.unbound_control='0'
unbound.ub_main.validator='0'
unbound.ub_main.validator_ntp='1'
unbound.ub_main.verbosity='1'
unbound.ub_main.iface_trig='lan' 'wan'
unbound.ub_main.iface_wan='wan'
unbound.ub_main.listen_port='5353'
unbound.ub_main.protocol='ip4_only'
unbound.ub_main.enabled='1'
unbound.ub_main.recursion='aggressive'
unbound.auth_icann=zone
unbound.auth_icann.enabled='0'
unbound.auth_icann.fallback='1'
unbound.auth_icann.url_dir='https://www.internic.net/domain/'
unbound.auth_icann.zone_type='auth_zone'
unbound.auth_icann.server='lax.xfr.dns.icann.org' 'iad.xfr.dns.icann.org'
unbound.auth_icann.zone_name='.' 'arpa.' 'in-addr.arpa.' 'ip6.arpa.'
unbound.fwd_isp=zone
unbound.fwd_isp.enabled='0'
unbound.fwd_isp.fallback='1'
unbound.fwd_isp.resolv_conf='1'
unbound.fwd_isp.zone_type='forward_zone'
unbound.fwd_isp.zone_name='isp-bill.example.com.' 'isp-mail.example.net.'
unbound.fwd_google=zone
unbound.fwd_google.enabled='0'
unbound.fwd_google.fallback='1'
unbound.fwd_google.tls_index='dns.google'
unbound.fwd_google.tls_upstream='1'
unbound.fwd_google.zone_type='forward_zone'
unbound.fwd_google.server='8.8.4.4' '8.8.8.8' '2001:4860:4860::8844' '2001:4860:4860::8888'
unbound.fwd_google.zone_name='.'
unbound.fwd_cloudflare=zone
unbound.fwd_cloudflare.enabled='0'
unbound.fwd_cloudflare.fallback='1'
unbound.fwd_cloudflare.tls_index='cloudflare-dns.com'
unbound.fwd_cloudflare.tls_upstream='1'
unbound.fwd_cloudflare.zone_type='forward_zone'
unbound.fwd_cloudflare.server='1.1.1.1' '1.0.0.1' '2606:4700:4700::1111' '2606:4700:4700::1001'
unbound.fwd_cloudflare.zone_name='.'
upnpd.config=upnpd
upnpd.config.enabled='0'
upnpd.config.enable_natpmp='1'
upnpd.config.enable_upnp='1'
upnpd.config.secure_mode='1'
upnpd.config.log_output='0'
upnpd.config.download='1024'
upnpd.config.upload='512'
upnpd.config.internal_iface='lan'
upnpd.config.port='5000'
upnpd.config.upnp_lease_file='/var/run/miniupnpd.leases'
upnpd.config.igdv1='1'
upnpd.config.ext_ip_reserved_ignore='1'
upnpd.@perm_rule[0]=perm_rule
upnpd.@perm_rule[0].action='allow'
upnpd.@perm_rule[0].ext_ports='1024-65535'
upnpd.@perm_rule[0].int_addr='0.0.0.0/0'
upnpd.@perm_rule[0].int_ports='1024-65535'
upnpd.@perm_rule[0].comment='Allow high ports'
upnpd.@perm_rule[1]=perm_rule
upnpd.@perm_rule[1].action='deny'
upnpd.@perm_rule[1].ext_ports='0-65535'
upnpd.@perm_rule[1].int_addr='0.0.0.0/0'
upnpd.@perm_rule[1].int_ports='0-65535'
upnpd.@perm_rule[1].comment='Default deny'
v2ray.main=v2ray
v2ray.main.v2ray_file='/usr/bin/v2ray'
v2ray.main.mem_percentage='0'
v2ray.main.loglevel='debug'
v2ray.main.access_log='/dev/null'
v2ray.main.error_log='/dev/null'
v2ray.main.enabled='0'
v2ray.main.inbounds='omr' 'omrtest'
v2ray.main.outbounds='omrout' 'omrexit'
v2ray.main_dns=dns
v2ray.main_dns.hosts='example.com|127.0.0.1'
v2ray.main_dns.enabled='0'
v2ray.main_policy=policy
v2ray.main_policy.enabled='1'
v2ray.main_policy.levels='policy_level_0'
v2ray.policy_level_0=policy_level
v2ray.policy_level_0.level='0'
v2ray.policy_level_0.handshake='4'
v2ray.policy_level_0.conn_idle='2400'
v2ray.policy_level_0.uplink_only='0'
v2ray.policy_level_0.downlink_only='0'
v2ray.policy_level_0.buffer_size='512'
v2ray.main_transparent_proxy=transparent_proxy
v2ray.main_transparent_proxy.proxy_mode='default'
v2ray.main_transparent_proxy.apnic_delegated_mirror='apnic'
v2ray.main_transparent_proxy.gfwlist_mirror='github'
v2ray.main_transparent_proxy.redirect_udp='1'
v2ray.main_transparent_proxy.redirect_port='1897'
v2ray.omrout=outbound
v2ray.omrout.tag='omrout_tunnel'
v2ray.omrout.protocol='vless'
v2ray.omrout.s_vmess_port='65228'
v2ray.omrout.s_vmess_user_alter_id='0'
v2ray.omrout.s_vless_port='65228'
v2ray.omrout.s_vless_user_encryption='none'
v2ray.omrout.s_vless_user_alter_id='0'
v2ray.omrout.ss_network='tcp'
v2ray.omrout.ss_security='tls'
v2ray.omrout.ss_tls_allow_insecure='1'
v2ray.omrout.ss_tls_disable_system_root='1'
v2ray.omrout.ss_tls_cert_usage='verify'
v2ray.omrout.ss_tls_cert_file='/etc/luci-uploads/client.crt'
v2ray.omrout.ss_tls_key_file='/etc/luci-uploads/client.key'
v2ray.omrout.mux_concurrency='8'
v2ray.omrout.s_vmess_user_security='chacha20-poly1305'
v2ray.omrout.s_vless_user_security='chacha20-poly1305'
v2ray.omrout.s_vmess_address='27.112.X.X'
v2ray.omrout.s_vless_address='27.112.X.X'
v2ray.omrout.s_vmess_user_id='9fb92bc5-6a5e-4313-97bf-7c8d6c0ea437'
v2ray.omrout.s_vless_user_id='9fb92bc5-6a5e-4313-97bf-7c8d6c0ea437'
v2ray.omr=inbound
v2ray.omr.tag='omrtunnel'
v2ray.omr.listen='0.0.0.0'
v2ray.omr.port='1897'
v2ray.omr.protocol='dokodemo-door'
v2ray.omr.s_dokodemo_door_network='tcp' 'udp'
v2ray.omr.ss_sockopt_tproxy='redirect'
v2ray.omr.ss_sockopt_tcp_fast_open='1'
v2ray.omr.s_dokodemo_door_follow_redirect='1'
v2ray.omr6=inbound
v2ray.omr6.tag='omrtunnel6'
v2ray.omr6.listen='::'
v2ray.omr6.port='1898'
v2ray.omr6.protocol='dokodemo-door'
v2ray.omr6.s_dokodemo_door_network='tcp' 'udp'
v2ray.omr6.ss_sockopt_tproxy='tproxy'
v2ray.omr6.ss_sockopt_tcp_fast_open='1'
v2ray.omr6.s_dokodemo_door_follow_redirect='1'
v2ray.omrtest=inbound
v2ray.omrtest.port='1111'
v2ray.omrtest.protocol='socks'
v2ray.omrtest.listen='127.0.0.1'
v2ray.omrtest.s_socks_auth='noauth'
v2ray.omrtest.s_socks_udp='1'
v2ray.omrtest.s_socks_ip='127.0.0.1'
v2ray.omrtest.s_socks_userlevel='0'
v2ray.main_reverse=reverse
v2ray.main_reverse.enabled='1'
v2ray.main_reverse.bridges='omrbridge|omr.lan'
v2ray.omrexit=outbound
v2ray.omrexit.protocol='freedom'
v2ray.omrexit.tag='out'
v2ray.omrrouting=routing_rule
v2ray.omrrouting.type='field'
v2ray.omrrouting.inbound_tag='omrbridge'
v2ray.omrrouting.outbound_tag='omrout_tunnel'
v2ray.omrrouting.domain='full:omr.lan'
v2ray.omrroutingo=routing_rule
v2ray.omrroutingo.type='field'
v2ray.omrroutingo.inbound_tag='omrbridge'
v2ray.omrroutingo.outbound_tag='out'
v2ray.main_routing=routing
v2ray.main_routing.enabled='1'
v2ray.main_routing.rules='omrrouting' 'omrroutingo'
vnstat.@vnstat[0]=vnstat
vnstat.@vnstat[0].interface='wan1' 'wan2' 'eth1' 'eth2' 'eth3'
Powered by openmptcprouter v0.57.3 r0+15225-bfc433efd4

@Ysurac
Copy link
Owner

Ysurac commented Apr 29, 2021

You seems to be using MPTCP over VPN option. Disable it.

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Already disabled, still no luck

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Older version used to work OK in this scenario when it was on 0.55 or 0.56

@Ysurac
Copy link
Owner

Ysurac commented Apr 29, 2021

MPTCP over VPN is not disabled in log and config.
You tried to reboot VPS and router ?

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

I rebooted both OMR and VPS, still like this, no luck, even downgraded to 0.56.5 still not resolve, so I reverted back to 0.57.3

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Here is the latest log

Thu Apr 29 14:33:09 2021 daemon.notice openvpn(wan3)[20846]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:33:09 2021 daemon.err openvpn(wan3)[20846]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:33:09 2021 daemon.notice openvpn(wan3)[20846]: Exiting due to fatal error
Thu Apr 29 14:33:09 2021 daemon.notice procd: /etc/rc.d/S95done: Failed to initialize libusb: LIBUSB_ERROR_OTHER
Thu Apr 29 14:33:10 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Thu Apr 29 14:33:10 2021 user.notice firewall: Reloading firewall due to ifup of wan3 (eth3)
Thu Apr 29 14:33:11 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:33:12 2021 daemon.notice procd: /etc/rc.d/S95done: Failed to initialize libusb: LIBUSB_ERROR_OTHER
Thu Apr 29 14:33:13 2021 user.err vnstat_backup: cannot restore, backup file does not exist (yet)
Thu Apr 29 14:33:13 2021 user.notice adb-enablemodem: INFO: waiting for device
Thu Apr 29 14:33:14 2021 daemon.info omr-tracker-ss: Shadowsocks is down (can't contact via http 1.0.0.1, 212.27.48.10, 198.27.92.1)
Thu Apr 29 14:33:14 2021 user.notice Shadowsocks: Rules DOWN
Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:33:14 2021 daemon.warn openvpn(wan3)[23362]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:33:14 2021 daemon.err openvpn(wan3)[23362]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:33:14 2021 daemon.notice openvpn(wan3)[23362]: Exiting due to fatal error
Thu Apr 29 14:10:01 2021 user.notice omr-bypass: Restart dnsmasq...
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[6685]: exiting on receipt of SIGTERM
Thu Apr 29 14:10:02 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Apr 29 14:10:02 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Apr 29 14:10:02 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: started, version 2.82 cachesize 150
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: DNS service limited to local subnets
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq-dhcp[23666]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h
Thu Apr 29 14:10:02 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain test
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain onion
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain localhost
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain local
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain invalid
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain bind
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain use-application-dns.net
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using only locally-known addresses for domain lan
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using nameserver 127.0.0.1#5353
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: using 1 more local addresses
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: read /etc/hosts - 4 addresses
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq[23666]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:10:02 2021 daemon.info dnsmasq-dhcp[23666]: read /etc/ethers - 0 addresses
Thu Apr 29 14:10:02 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:10:02 2021 user.notice Shadowsocks: Rules UP
Thu Apr 29 14:10:03 2021 user.notice Shadowsocks: Reload omr-bypass rules
Thu Apr 29 14:10:03 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:05 2021 daemon.warn openvpn(wan3)[25097]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:05 2021 daemon.err openvpn(wan3)[25097]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:05 2021 daemon.notice openvpn(wan3)[25097]: Exiting due to fatal error
Thu Apr 29 14:10:06 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 14:10:06 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:10:06 2021 daemon.info dnsmasq[23666]: read /etc/hosts - 4 addresses
Thu Apr 29 14:10:06 2021 daemon.info dnsmasq[23666]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:10:06 2021 daemon.info dnsmasq-dhcp[23666]: read /etc/ethers - 0 addresses
Thu Apr 29 14:10:08 2021 user.notice omr-bypass: Restart dnsmasq...
Thu Apr 29 14:10:08 2021 daemon.info dnsmasq[23666]: exiting on receipt of SIGTERM
Thu Apr 29 14:10:09 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12)
Thu Apr 29 14:10:09 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Apr 29 14:10:09 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3
Thu Apr 29 14:10:09 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Apr 29 14:10:09 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: started, version 2.82 cachesize 150
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: DNS service limited to local subnets
Thu Apr 29 14:10:09 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq-dhcp[26587]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain test
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain onion
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain localhost
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain local
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain invalid
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain bind
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain use-application-dns.net
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using only locally-known addresses for domain lan
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using nameserver 127.0.0.1#5353
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: using 1 more local addresses
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:10:09 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses
Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:10 2021 daemon.warn openvpn(wan3)[27008]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:10 2021 daemon.err openvpn(wan3)[27008]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:10 2021 daemon.notice openvpn(wan3)[27008]: Exiting due to fatal error
Thu Apr 29 14:10:11 2021 daemon.info omr-tracker-ss: Server (27.112.X.X) seems down, no answer to ping
Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:15 2021 daemon.warn openvpn(wan3)[27207]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:15 2021 daemon.err openvpn(wan3)[27207]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:15 2021 daemon.notice openvpn(wan3)[27207]: Exiting due to fatal error
Thu Apr 29 14:10:16 2021 daemon.info omr-tracker-ss: Shadowsocks is down (can't contact via http 1.0.0.1, 212.27.48.10, 198.27.92.1, 151.101.129.164)
Thu Apr 29 14:10:17 2021 user.notice Shadowsocks: Rules DOWN
Thu Apr 29 14:10:19 2021 daemon.info glorytun[20304]: STOPPED tun0
Thu Apr 29 14:10:20 2021 daemon.err glorytun[20304]: 27.112.X.X.65001: connected
Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:20 2021 daemon.warn openvpn(wan3)[27565]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:20 2021 daemon.err openvpn(wan3)[27565]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:20 2021 daemon.notice openvpn(wan3)[27565]: Exiting due to fatal error
Thu Apr 29 14:10:22 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps: % Total % Received % Xferd Average Speed Time Time Time Current
Thu Apr 29 14:10:22 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps: Dload Upload Total Spent Left Speed
Thu Apr 29 14:10:23 2021 user.notice mptcp: Reloading mptcp config due to ifup of wan3 (eth3)
Thu Apr 29 14:10:25 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0)
Thu Apr 29 14:10:25 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps:
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0
0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0
0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0
Thu Apr 29 14:10:25 2021 daemon.notice procd: /etc/rc.d/S99openmptcprouter-vps: curl: (28) Operation timed out after 3001 milliseconds with 0 out of 0 bytes received
Thu Apr 29 14:10:25 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer)
Thu Apr 29 14:10:25 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:25 2021 daemon.warn openvpn(wan3)[29199]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:25 2021 daemon.err openvpn(wan3)[29199]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:25 2021 daemon.notice openvpn(wan3)[29199]: Exiting due to fatal error
Thu Apr 29 14:10:26 2021 user.notice omr-tracker: Launching...
Thu Apr 29 14:10:26 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:10:26 2021 user.notice Shadowsocks: Rules UP
Thu Apr 29 14:10:26 2021 daemon.notice procd: /etc/rc.d/S99shadowsocks-libev: Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Thu Apr 29 14:10:26 2021 daemon.notice procd: /etc/rc.d/S99shadowsocks-libev: Flush terminated
Thu Apr 29 14:10:26 2021 user.notice Shadowsocks: Reload omr-bypass rules
Thu Apr 29 14:10:26 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:10:29 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 14:10:30 2021 daemon.err glorytun[20304]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 14:10:30 2021 daemon.info glorytun[20304]: STOPPED tun0
Thu Apr 29 14:10:30 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses
Thu Apr 29 14:10:30 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:10:30 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses
Thu Apr 29 14:10:30 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:10:30 2021 user.info : using tcp fast open
Thu Apr 29 14:10:30 2021 user.info : using tcp fast open
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: enable TCP no-delay
Thu Apr 29 14:10:30 2021 user.info : using tcp fast open
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: resolving hostname to IPv6 address first
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: enable TCP no-delay
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: resolving hostname to IPv6 address first
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: initializing ciphers... chacha20-ietf-poly1305
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: initializing ciphers... chacha20-ietf-poly1305
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: enable TCP no-delay
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: resolving hostname to IPv6 address first
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: listening at 0.0.0.0:1101
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: listening at 0.0.0.0:1101
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: tcp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: tcp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: UDP relay enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: UDP relay enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: initializing ciphers... chacha20-ietf-poly1305
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: udp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: udp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31120]: running from root user
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31122]: running from root user
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: listening at 0.0.0.0:1101
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: tcp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: UDP relay enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: udp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31121]: running from root user
Thu Apr 29 14:10:30 2021 user.info : using tcp fast open
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: using tcp fast open
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: enable TCP no-delay
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: enable TCP no-delay
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: resolving hostname to IPv6 address first
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: initializing ciphers... chacha20-ietf-poly1305
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: initializing ciphers... chacha20-ietf-poly1305
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: listening at 127.0.0.1:1111
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: listening at 0.0.0.0:1101
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: tcp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: tcp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: UDP relay enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: udprelay enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: udp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: udp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-local[31117]: running from root user
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31123]: running from root user
Thu Apr 29 14:10:30 2021 user.info : using tcp fast open
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: enable TCP no-delay
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: resolving hostname to IPv6 address first
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: initializing ciphers... chacha20-ietf-poly1305
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: listening at 0.0.0.0:1100
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: tcp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: UDP relay enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: udp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31119]: running from root user
Thu Apr 29 14:10:30 2021 user.info : using tcp fast open
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: enable TCP no-delay
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: resolving hostname to IPv6 address first
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: initializing ciphers... chacha20-ietf-poly1305
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: listening at :::1100
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: tcp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: UDP relay enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: udp port reuse enabled
Thu Apr 29 14:10:30 2021 daemon.info /usr/bin/ss-redir[31118]: running from root user
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: ttyd 1.6.1 (libwebsockets 3.1.0)
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: tty configuration:
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: start command: /usr/libexec/login.sh
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: close signal: SIGHUP (1)
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: terminal type: xterm-256color
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: Using foreign event loop...
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: Creating Vhost 'default' port 7681, 2 protocols, IPv6 off
Thu Apr 29 14:10:30 2021 daemon.err glorytun[20304]: 27.112.X.X.65001: connected
Thu Apr 29 14:10:30 2021 daemon.notice ttyd[31184]: Listening on port: 7681
Thu Apr 29 14:10:30 2021 daemon.notice procd: /etc/rc.d/S99v2ray: Flush terminated
Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:31 2021 daemon.warn openvpn(wan3)[31321]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:31 2021 daemon.err openvpn(wan3)[31321]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:31 2021 daemon.notice openvpn(wan3)[31321]: Exiting due to fatal error
Thu Apr 29 14:10:31 2021 daemon.info procd: - init complete -
Thu Apr 29 14:10:31 2021 user.notice omr-tracker: Launched
Thu Apr 29 14:10:32 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: omrvpn down
Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: wan1 (eth1) switched off
Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: Delete default route via dev eth1
Thu Apr 29 14:10:32 2021 user.notice post-tracking-post-tracking: Check API configuration...
Thu Apr 29 14:10:32 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses
Thu Apr 29 14:10:32 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:10:32 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses
Thu Apr 29 14:10:32 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:10:33 2021 daemon.warn dnsmasq[26587]: failed to create listening socket for 10.255.255.2: Address not available
Thu Apr 29 14:10:33 2021 daemon.warn dnsmasq[26587]: failed to create listening socket for 10.255.255.2: Address not available
Thu Apr 29 14:10:33 2021 daemon.debug dnsmasq[26587]: listening on tun0(#24): 10.255.255.2 port 53
Thu Apr 29 14:10:33 2021 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it
Thu Apr 29 14:10:33 2021 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0)
Thu Apr 29 14:10:33 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Thu Apr 29 14:10:33 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: service stopped (unbound 1.13.0).
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: server stats for thread 0: 87 queries, 21 answers from cache, 66 recursions, 0 prefetch, 0 rejected by ip ratelimiting
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: server stats for thread 0: requestlist max 3 avg 0.560606 exceeded 0 jostled 0
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: average recursion processing time 0.180641 sec
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: histogram of recursion processing times
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: [25%]=0.0142155 median[50%]=0.0294912 [75%]=0.126391
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: lower(secs) upper(secs) recursions
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.004096 0.008192 4
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.008192 0.016384 17
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.016384 0.032768 15
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.032768 0.065536 7
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.065536 0.131072 7
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.131072 0.262144 4
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.262144 0.524288 3
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 0.524288 1.000000 5
Thu Apr 29 14:10:34 2021 daemon.info unbound: [11837:0] info: 1.000000 2.000000 4
Thu Apr 29 14:10:35 2021 daemon.notice unbound: [845:0] notice: init module 0: iterator
Thu Apr 29 14:10:35 2021 daemon.info unbound: [845:0] info: start of service (unbound 1.13.0).
Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:36 2021 daemon.warn openvpn(wan3)[1455]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:36 2021 daemon.err openvpn(wan3)[1455]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:36 2021 daemon.notice openvpn(wan3)[1455]: Exiting due to fatal error
Thu Apr 29 14:10:36 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 14:10:37 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses
Thu Apr 29 14:10:37 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:10:37 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses
Thu Apr 29 14:10:37 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:10:38 2021 daemon.info procd: Instance glorytun::instance1 pid 20304 not stopped on SIGTERM, sending SIGKILL instead
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Network device 'tun0' link is down
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is now down
Thu Apr 29 14:10:38 2021 daemon.debug dnsmasq[26587]: stopped listening on tun0(#24): 10.255.255.2 port 53
Thu Apr 29 14:10:38 2021 daemon.info glorytun[1763]: INITIALIZED tun0
Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: remove network interface tun0: event processed
Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: event reported: action=remove, name=tun0, subsystem=net
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Network device 'tun0' link is up
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is setting up now
Thu Apr 29 14:10:38 2021 daemon.notice netifd: Interface 'omrvpn' is now up
Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: add network interface tun0: event processed
Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net
Thu Apr 29 14:10:38 2021 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Thu Apr 29 14:10:38 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected
Thu Apr 29 14:10:39 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0)
Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:41 2021 daemon.warn openvpn(wan3)[2339]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:41 2021 daemon.err openvpn(wan3)[2339]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:41 2021 daemon.notice openvpn(wan3)[2339]: Exiting due to fatal error
Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:46 2021 daemon.warn openvpn(wan3)[2702]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:46 2021 daemon.err openvpn(wan3)[2702]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:46 2021 daemon.notice openvpn(wan3)[2702]: Exiting due to fatal error
Thu Apr 29 14:10:48 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 14:10:48 2021 daemon.info glorytun[1763]: STOPPED tun0
Thu Apr 29 14:10:49 2021 user.notice OMR-VPS: Can't get vps token, try later (can't ping server vps, no server API answer)
Thu Apr 29 14:10:49 2021 user.notice post-tracking-post-tracking: Check API configuration... Done
Thu Apr 29 14:10:49 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected
Thu Apr 29 14:10:49 2021 user.notice post-tracking-post-tracking: Can't find OpenVPN, restart it
Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:49 2021 daemon.warn openvpn(wan3)[3178]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:49 2021 daemon.err openvpn(wan3)[3178]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:49 2021 daemon.notice openvpn(wan3)[3178]: Exiting due to fatal error
Thu Apr 29 14:10:49 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:10:50 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12)
Thu Apr 29 14:10:50 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3
Thu Apr 29 14:10:53 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 14:10:53 2021 daemon.info dnsmasq[26587]: read /etc/hosts - 4 addresses
Thu Apr 29 14:10:53 2021 daemon.info dnsmasq[26587]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:10:53 2021 daemon.info dnsmasq-dhcp[26587]: read /etc/ethers - 0 addresses
Thu Apr 29 14:10:53 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:10:54 2021 daemon.debug dnsmasq[26587]: listening on tun0(#25): 10.255.255.2 port 53
Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:54 2021 daemon.warn openvpn(wan3)[4840]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:54 2021 daemon.err openvpn(wan3)[4840]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:54 2021 daemon.notice openvpn(wan3)[4840]: Exiting due to fatal error
Thu Apr 29 14:10:59 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 14:10:59 2021 daemon.info glorytun[1763]: STOPPED tun0
Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:10:59 2021 daemon.warn openvpn(wan3)[5089]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:10:59 2021 daemon.err openvpn(wan3)[5089]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:10:59 2021 daemon.notice openvpn(wan3)[5089]: Exiting due to fatal error
Thu Apr 29 14:10:59 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected
Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:04 2021 daemon.warn openvpn(wan3)[5344]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:04 2021 daemon.err openvpn(wan3)[5344]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:04 2021 daemon.notice openvpn(wan3)[5344]: Exiting due to fatal error
Thu Apr 29 14:11:05 2021 user.notice mptcp: Reloading mptcp config due to ifup of omrvpn (tun0)
Thu Apr 29 14:11:07 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:09 2021 daemon.warn openvpn(wan3)[7027]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:09 2021 daemon.err openvpn(wan3)[7027]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:09 2021 daemon.notice openvpn(wan3)[7027]: Exiting due to fatal error
Thu Apr 29 14:11:09 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 14:11:09 2021 daemon.info glorytun[1763]: STOPPED tun0
Thu Apr 29 14:11:10 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected
Thu Apr 29 14:11:11 2021 user.notice omr-bypass: Restart dnsmasq...
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[26587]: exiting on receipt of SIGTERM
Thu Apr 29 14:11:11 2021 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Apr 29 14:11:11 2021 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Apr 29 14:11:11 2021 user.notice dnsmasq: Allowing RFC1918 responses for domain plex.direct
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: started, version 2.82 cachesize 150
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: DNS service limited to local subnets
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq-dhcp[7574]: DHCP, IP range 192.168.120.100 -- 192.168.120.249, lease time 12h
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain test
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain onion
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain localhost
Thu Apr 29 14:11:11 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain local
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain invalid
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain bind
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain use-application-dns.net
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using only locally-known addresses for domain lan
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using nameserver 127.0.0.1#5353
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: using 1 more local addresses
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: read /etc/hosts - 4 addresses
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq[7574]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:11:11 2021 daemon.info dnsmasq-dhcp[7574]: read /etc/ethers - 0 addresses
Thu Apr 29 14:11:12 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Thu Apr 29 14:11:12 2021 user.notice omr-tracker: Launching...
Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:14 2021 daemon.warn openvpn(wan3)[7819]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:14 2021 daemon.err openvpn(wan3)[7819]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:14 2021 daemon.notice openvpn(wan3)[7819]: Exiting due to fatal error
Thu Apr 29 14:11:18 2021 user.notice omr-tracker: Launched
Thu Apr 29 14:11:18 2021 user.notice post-tracking-post-tracking: wan1 (eth1) switched off
Thu Apr 29 14:11:18 2021 user.notice post-tracking-post-tracking: Delete default route via dev eth1
Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:19 2021 daemon.warn openvpn(wan3)[8376]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:19 2021 daemon.err openvpn(wan3)[8376]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:19 2021 daemon.notice openvpn(wan3)[8376]: Exiting due to fatal error
Thu Apr 29 14:11:20 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 14:11:20 2021 daemon.info glorytun[1763]: STOPPED tun0
Thu Apr 29 14:11:21 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected
Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:24 2021 daemon.warn openvpn(wan3)[9003]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:24 2021 daemon.err openvpn(wan3)[9003]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:24 2021 daemon.notice openvpn(wan3)[9003]: Exiting due to fatal error
Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:29 2021 daemon.warn openvpn(wan3)[9303]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:29 2021 daemon.err openvpn(wan3)[9303]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:29 2021 daemon.notice openvpn(wan3)[9303]: Exiting due to fatal error
Thu Apr 29 14:11:31 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 14:11:31 2021 daemon.info glorytun[1763]: STOPPED tun0
Thu Apr 29 14:11:31 2021 daemon.err glorytun[1763]: 27.112.X.X.65001: connected
Thu Apr 29 14:11:32 2021 user.notice post-tracking-post-tracking: omrvpn down because gateway down
Thu Apr 29 14:11:33 2021 user.notice post-tracking-post-tracking: Glorytun VPN down, restart it
Thu Apr 29 14:11:33 2021 daemon.info glorytun: starting glorytun vpn instance vpn
Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:34 2021 daemon.warn openvpn(wan3)[9906]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:34 2021 daemon.err openvpn(wan3)[9906]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:34 2021 daemon.notice openvpn(wan3)[9906]: Exiting due to fatal error
Thu Apr 29 14:11:36 2021 user.notice post-tracking-post-tracking: wan3 (eth3) switched off because ping from 192.168.1.165 error (4.2.2.1,8.8.8.8,80.67.169.12)
Thu Apr 29 14:11:36 2021 user.notice post-tracking-post-tracking: Delete default route via 192.168.1.1 dev eth3
Thu Apr 29 14:11:38 2021 daemon.info procd: Instance glorytun::instance1 pid 1763 not stopped on SIGTERM, sending SIGKILL instead
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Network device 'tun0' link is down
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity loss
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is now down
Thu Apr 29 14:11:38 2021 daemon.debug dnsmasq[7574]: stopped listening on tun0(#25): 10.255.255.2 port 53
Thu Apr 29 14:11:38 2021 daemon.info glorytun[10398]: INITIALIZED tun0
Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: remove network interface tun0: event processed
Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: event reported: action=remove, name=tun0, subsystem=net
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is disabled
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is enabled
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Network device 'tun0' link is up
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' has link connectivity
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is setting up now
Thu Apr 29 14:11:38 2021 daemon.notice netifd: Interface 'omrvpn' is now up
Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: add network interface tun0: event processed
Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: event reported: action=add, name=tun0, subsystem=net
Thu Apr 29 14:11:38 2021 user.notice ModemManager: hotplug: error: parent device sysfspath not found
Thu Apr 29 14:11:38 2021 daemon.err glorytun[10398]: 27.112.X.X.65001: connected
Thu Apr 29 14:11:38 2021 user.notice firewall: Reloading firewall due to ifup of omrvpn (tun0)
Thu Apr 29 14:11:39 2021 user.notice omr-bypass: Starting OMR-ByPass...
Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:39 2021 daemon.warn openvpn(wan3)[10873]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:39 2021 daemon.err openvpn(wan3)[10873]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:39 2021 daemon.notice openvpn(wan3)[10873]: Exiting due to fatal error
Thu Apr 29 14:11:43 2021 user.notice omr-bypass: Reload dnsmasq...
Thu Apr 29 14:11:43 2021 daemon.info dnsmasq[7574]: read /etc/hosts - 4 addresses
Thu Apr 29 14:11:43 2021 daemon.info dnsmasq[7574]: read /tmp/hosts/dhcp.cfg01411c - 1 addresses
Thu Apr 29 14:11:43 2021 daemon.info dnsmasq-dhcp[7574]: read /etc/ethers - 0 addresses
Thu Apr 29 14:11:43 2021 user.notice omr-bypass: OMR-ByPass is running
Thu Apr 29 14:11:44 2021 daemon.debug dnsmasq[7574]: listening on tun0(#26): 10.255.255.2 port 53
Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:44 2021 daemon.warn openvpn(wan3)[12660]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:44 2021 daemon.err openvpn(wan3)[12660]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:44 2021 daemon.notice openvpn(wan3)[12660]: Exiting due to fatal error
Thu Apr 29 14:11:48 2021 daemon.err glorytun[10398]: 27.112.X.X.65001: key exchange failed
Thu Apr 29 14:11:48 2021 daemon.info glorytun[10398]: STOPPED tun0
Thu Apr 29 14:11:49 2021 daemon.err glorytun[10398]: 27.112.X.X.65001: connected
Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:50 2021 daemon.warn openvpn(wan3)[13038]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:50 2021 daemon.err openvpn(wan3)[13038]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:50 2021 daemon.notice openvpn(wan3)[13038]: Exiting due to fatal error
Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: OpenVPN 2.5.0 x86_64-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: library versions: OpenSSL 1.1.1i 8 Dec 2020
Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Thu Apr 29 14:11:55 2021 daemon.warn openvpn(wan3)[13447]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: TCP/UDP: Preserving recently used remote address: [AF_INET]27.112.X.X:65301
Thu Apr 29 14:11:55 2021 daemon.err openvpn(wan3)[13447]: TCP/UDP: Socket bind failed on local address [AF_INET]192.168.18.120:65301: Address not available (errno=99)
Thu Apr 29 14:11:55 2021 daemon.notice openvpn(wan3)[13447]: Exiting due to fatal error

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Should I re-install the VPS?

@Ysurac
Copy link
Owner

Ysurac commented Apr 29, 2021

No.
Your still have MPTCP over VPN enabled for WAN3.

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Hmmm, that's is strange, I disabled it earlier. MPTCP over VPN still being checked regardless I have unchecked it on Wizard

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

I can't disable MPTCP over VPN, it keeps turn on

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

I ended up factory reset the OMR, hopefully it is working

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

I think there is a bug in MPTCP over VPN. Once it is checked, it can't be unchecked no matter what you do. Also, how come MPTCP over VPN affect this issue?

@Ysurac
Copy link
Owner

Ysurac commented Apr 29, 2021

Maybe. There is not this MPTCP over VPN issue in 0.58rc1.
This affect this issue because MPTCP over VPN was not working, OpenVPN crashed.

@ccmks
Copy link
Author

ccmks commented Apr 29, 2021

Also, how do I run iperf from either of WAN to my VPS, just to make sure that I am getting the expected throughput by testing the iperf

@github-actions
Copy link

This issue is stale because it has been open 90 days with no activity. Remove stale label or comment or this will be closed in 5 days

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants