Hi,
I have made a script which loads every vpn that my vpn provider has, so I can switch between servers easily in my router.
I can maintain 10 concurrent connections and instead of using tun0 to tun9 I would like to use thename of the vpn as the tun device name
example
openvpn.beetvpn_asia_jakarta_5=openvpn
openvpn.beetvpn_asia_jakarta_5.auth='SHA256'
openvpn.beetvpn_asia_jakarta_5.auth_nocache='1'
openvpn.beetvpn_asia_jakarta_5.auth_user_pass='/etc/openvpn/beetvpn.auth'
openvpn.beetvpn_asia_jakarta_5.ca='/etc/openvpn/beetvpn.ca'
openvpn.beetvpn_asia_jakarta_5.cipher='AES-256-GCM'
openvpn.beetvpn_asia_jakarta_5.client='1'
openvpn.beetvpn_asia_jakarta_5.compress='stub-v2'
openvpn.beetvpn_asia_jakarta_5.dev='beetvpn_asia_jakarta_5'
openvpn.beetvpn_asia_jakarta_5.dev_type='tun'
openvpn.beetvpn_asia_jakarta_5.enabled='1'
openvpn.beetvpn_asia_jakarta_5.nobind='1'
openvpn.beetvpn_asia_jakarta_5.persist_key='1'
openvpn.beetvpn_asia_jakarta_5.persist_tun='1'
openvpn.beetvpn_asia_jakarta_5.port='53'
openvpn.beetvpn_asia_jakarta_5.proto='udp'
openvpn.beetvpn_asia_jakarta_5.remote='asia-id5.321inter.net'
openvpn.beetvpn_asia_jakarta_5.tls_cipher='TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384'
openvpn.beetvpn_asia_jakarta_5.tls_client='1'
openvpn.beetvpn_asia_jakarta_5.tls_crypt='/etc/openvpn/beetvpn.tlscrypt'
openvpn.beetvpn_asia_jakarta_5.verb='3'
This appears to make the connection but then it fails with a tls timeout a while later
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: TCP/UDP: Preserving recently used remote address: [AF_INET]103.150.61.218:53
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: Socket Buffers: R=[212992->212992] S=[212992->212992]
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: UDP link local: (not bound)
Thu Oct 17 08:46:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: UDP link remote: [AF_INET]103.150.61.218:53
Thu Oct 17 08:47:57 2024 daemon.err openvpn(beetvpn_asia_jakarta_5)[4860]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Thu Oct 17 08:47:57 2024 daemon.err openvpn(beetvpn_asia_jakarta_5)[4860]: TLS Error: TLS handshake failed
Thu Oct 17 08:47:57 2024 daemon.notice openvpn(beetvpn_asia_jakarta_5)[4860]: SIGUSR1[soft,tls-error] received, process restarting