Tue Sep 29 01:21:53 2020 daemon.err openvpn(mullvad)[4312]: event_wait : Interrupted system call (code=4)
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/route del -net 185.213.155.137 netmask 255.255.255.255
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: delete_route_ipv6(::/2)
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/route -A inet6 del ::/2 dev tun0
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: delete_route_ipv6(4000::/2)
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/route -A inet6 del 4000::/2 dev tun0
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: delete_route_ipv6(8000::/2)
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/route -A inet6 del 8000::/2 dev tun0
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: delete_route_ipv6(c000::/2)
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/route -A inet6 del c000::/2 dev tun0
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: Closing TUN/TAP interface
Tue Sep 29 01:21:53 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/ifconfig tun0 0.0.0.0
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4312]: /sbin/ifconfig tun0 del fdda:d0d0:cafe:1195::1000/64
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4312]: /etc/openvpn/downdns tun0 1500 1552 10.9.0.2 255.255.0.0 init
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4312]: SIGTERM[hard,] received, process exiting
Tue Sep 29 01:21:54 2020 daemon.warn openvpn(mullvad)[4497]: Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Sep 29 01:21:54 2020 daemon.warn openvpn(mullvad)[4497]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.213.155.137:1195
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: UDP link local: (not bound)
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: UDP link remote: [AF_INET]185.213.155.137:1195
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: TLS: Initial packet from [AF_INET]185.213.155.137:1195, sid=4de6aa64 467205f8
Tue Sep 29 01:21:54 2020 daemon.warn openvpn(mullvad)[4497]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: VERIFY OK: depth=2, C=SE, ST=Gotaland, L=Gothenburg, O=Amagicom AB, OU=Mullvad, CN=Mullvad Root CA v2, emailAddress=security@mullvad.net
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: VERIFY OK: depth=1, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=Mullvad Intermediate CA v3, emailAddress=security@mullvad.net
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: VERIFY KU OK
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: Validating certificate extended key usage
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: VERIFY EKU OK
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: VERIFY OK: depth=0, C=SE, ST=Gotaland, O=Amagicom AB, OU=Mullvad, CN=de-fra-007.mullvad.net, emailAddress=security@mullvad.net
Tue Sep 29 01:21:54 2020 daemon.warn openvpn(mullvad)[4497]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1557', remote='link-mtu 1558'
Tue Sep 29 01:21:54 2020 daemon.warn openvpn(mullvad)[4497]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Sep 29 01:21:54 2020 daemon.notice openvpn(mullvad)[4497]: [de-fra-007.mullvad.net] Peer Connection Initiated with [AF_INET]185.213.155.137:1195
Tue Sep 29 01:21:55 2020 daemon.notice openvpn(mullvad)[4497]: SENT CONTROL [de-fra-007.mullvad.net]: 'PUSH_REQUEST' (status=1)
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: SENT CONTROL [de-fra-007.mullvad.net]: 'PUSH_REQUEST' (status=1)
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.9.0.1,redirect-gateway def1 bypass-dhcp,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,comp-lzo no,route-gateway 10.9.0.1,topology subnet,socket-flags TCP_NODELAY,ifconfig-ipv6 fdda:d0d0:cafe:1195::1004/64 fdda:d0d0:cafe:1195::,ifconfig 10.9.0.6 255.255.0.0,peer-id 4,cipher AES-256-GCM'
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: compression parms modified
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: --socket-flags option modified
Tue Sep 29 01:22:00 2020 daemon.warn openvpn(mullvad)[4497]: NOTE: setsockopt TCP_NODELAY=1 failed
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: route options modified
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: route-related options modified
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: peer-id set
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: adjusting link_mtu to 1624
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: OPTIONS IMPORT: data channel crypto options modified
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: GDG6: remote_host_ipv6=n/a
Tue Sep 29 01:22:00 2020 daemon.warn openvpn(mullvad)[4497]: GDG6: NLMSG_ERROR: error Permission denied
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: TUN/TAP device tun0 opened
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: TUN/TAP TX queue length set to 100
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/ifconfig tun0 10.9.0.6 netmask 255.255.0.0 mtu 1500 broadcast 10.9.255.255
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/ifconfig tun0 add fdda:d0d0:cafe:1195::1004/64
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /etc/openvpn/updns tun0 1500 1552 10.9.0.6 255.255.0.0 init
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/route add -net 185.213.155.137 netmask 255.255.255.255 gw 192.168.1.1
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.9.0.1
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.9.0.1
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: add_route_ipv6(::/2 -> fdda:d0d0:cafe:1195:: metric -1) dev tun0
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/route -A inet6 add ::/2 dev tun0
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:1195:: metric -1) dev tun0
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/route -A inet6 add 4000::/2 dev tun0
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:1195:: metric -1) dev tun0
Tue Sep 29 01:22:00 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/route -A inet6 add 8000::/2 dev tun0
Tue Sep 29 01:22:01 2020 daemon.notice openvpn(mullvad)[4497]: add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:1195:: metric -1) dev tun0
Tue Sep 29 01:22:01 2020 daemon.notice openvpn(mullvad)[4497]: /sbin/route -A inet6 add c000::/2 dev tun0
Tue Sep 29 01:22:01 2020 daemon.notice openvpn(mullvad)[4497]: Initialization Sequence Completed
udp 0 0 0.0.0.0:57164 0.0.0.0:* 4497/openvpn
4497 /usr/sbin/openvpn --syslog openvpn(mullvad) --status /var/run/openvpn.mullvad.status --cd /etc/openvpn --config /etc/openvpn/mullvad.ovpn
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP qlen 1000
link/ether 22:0d:8e:d0:66:70 brd ff:ff:ff:ff:ff:ff
inet6 fe80::200d:8eff:fed0:6670/64 scope link
valid_lft forever preferred_lft forever
5: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP qlen 1000
link/ether c8:91:f9:16:bf:a2 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.99/24 brd 192.168.1.255 scope global br-lan
valid_lft forever preferred_lft forever
inet6 fd14:467e:3add::1/60 scope global
valid_lft forever preferred_lft forever
inet6 fe80::ca91:f9ff:fe16:bfa2/64 scope link
valid_lft forever preferred_lft forever
6: eth0.1@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP qlen 1000
link/ether c8:91:f9:16:bf:a2 brd ff:ff:ff:ff:ff:ff
11: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP qlen 1000
link/ether c8:91:f9:16:bf:a5 brd ff:ff:ff:ff:ff:ff
inet6 fe80::ca91:f9ff:fe16:bfa5/64 scope link
valid_lft forever preferred_lft forever
12: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-lan state UP qlen 1000
link/ether c8:91:f9:16:bf:a4 brd ff:ff:ff:ff:ff:ff
inet6 fe80::ca91:f9ff:fe16:bfa4/64 scope link
valid_lft forever preferred_lft forever
14: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN qlen 100
link/[65534]
inet 10.9.0.6/16 brd 10.9.255.255 scope global tun0
valid_lft forever preferred_lft forever
inet6 fdda:d0d0:cafe:1195::1004/64 scope global
valid_lft forever preferred_lft forever
inet6 fe80::8483:f76c:d768:5ea6/64 scope link
valid_lft forever preferred_lft forever
default via 192.168.1.1 dev br-lan
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
# Generated by iptables-save v1.8.3 on Tue Sep 29 01:22:04 2020
*nat
:PREROUTING ACCEPT [993:278545]
:INPUT ACCEPT [135:10936]
:OUTPUT ACCEPT [245:21090]
:POSTROUTING ACCEPT [157:14693]
:postrouting_lan_rule - [0:0]
:postrouting_rule - [0:0]
:postrouting_wan_rule - [0:0]
:prerouting_lan_rule - [0:0]
:prerouting_rule - [0:0]
:prerouting_wan_rule - [0:0]
:zone_lan_postrouting - [0:0]
:zone_lan_prerouting - [0:0]
:zone_wan_postrouting - [0:0]
:zone_wan_prerouting - [0:0]
-A PREROUTING -m comment --comment "!fw3: Custom prerouting rule chain" -j prerouting_rule
-A PREROUTING -i br-lan -m comment --comment "!fw3" -j zone_lan_prerouting
-A PREROUTING -i dsl0 -m comment --comment "!fw3" -j zone_wan_prerouting
-A PREROUTING -i tun0 -m comment --comment "!fw3" -j zone_wan_prerouting
-A POSTROUTING -m comment --comment "!fw3: Custom postrouting rule chain" -j postrouting_rule
-A POSTROUTING -o br-lan -m comment --comment "!fw3" -j zone_lan_postrouting
-A POSTROUTING -o dsl0 -m comment --comment "!fw3" -j zone_wan_postrouting
-A POSTROUTING -o tun0 -m comment --comment "!fw3" -j zone_wan_postrouting
-A zone_lan_postrouting -m comment --comment "!fw3: Custom lan postrouting rule chain" -j postrouting_lan_rule
-A zone_lan_prerouting -m comment --comment "!fw3: Custom lan prerouting rule chain" -j prerouting_lan_rule
-A zone_wan_postrouting -m comment --comment "!fw3: Custom wan postrouting rule chain" -j postrouting_wan_rule
-A zone_wan_postrouting -m comment --comment "!fw3" -j MASQUERADE
-A zone_wan_prerouting -m comment --comment "!fw3: Custom wan prerouting rule chain" -j prerouting_wan_rule
COMMIT
# Completed on Tue Sep 29 01:22:04 2020
# Generated by iptables-save v1.8.3 on Tue Sep 29 01:22:04 2020
*mangle
:PREROUTING ACCEPT [12566:7100645]
:INPUT ACCEPT [7006:3785523]
:FORWARD ACCEPT [4769:3058782]
:OUTPUT ACCEPT [6608:2206956]
:POSTROUTING ACCEPT [11134:5252933]
-A FORWARD -o dsl0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i dsl0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -o tun0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
-A FORWARD -i tun0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m comment --comment "!fw3: Zone wan MTU fixing" -j TCPMSS --clamp-mss-to-pmtu
COMMIT
# Completed on Tue Sep 29 01:22:04 2020
# Generated by iptables-save v1.8.3 on Tue Sep 29 01:22:04 2020
*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:forwarding_lan_rule - [0:0]
:forwarding_rule - [0:0]
:forwarding_wan_rule - [0:0]
:input_lan_rule - [0:0]
:input_rule - [0:0]
:input_wan_rule - [0:0]
:output_lan_rule - [0:0]
:output_rule - [0:0]
:output_wan_rule - [0:0]
:reject - [0:0]
:syn_flood - [0:0]
:zone_lan_dest_ACCEPT - [0:0]
:zone_lan_forward - [0:0]
:zone_lan_input - [0:0]
:zone_lan_output - [0:0]
:zone_lan_src_ACCEPT - [0:0]
:zone_wan_dest_ACCEPT - [0:0]
:zone_wan_dest_REJECT - [0:0]
:zone_wan_forward - [0:0]
:zone_wan_input - [0:0]
:zone_wan_output - [0:0]
:zone_wan_src_REJECT - [0:0]
-A INPUT -i lo -m comment --comment "!fw3" -j ACCEPT
-A INPUT -m comment --comment "!fw3: Custom input rule chain" -j input_rule
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "!fw3" -j syn_flood
-A INPUT -i br-lan -m comment --comment "!fw3" -j zone_lan_input
-A INPUT -i dsl0 -m comment --comment "!fw3" -j zone_wan_input
-A INPUT -i tun0 -m comment --comment "!fw3" -j zone_wan_input
-A FORWARD -m comment --comment "!fw3: Custom forwarding rule chain" -j forwarding_rule
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A FORWARD -i br-lan -m comment --comment "!fw3" -j zone_lan_forward
-A FORWARD -i dsl0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -i tun0 -m comment --comment "!fw3" -j zone_wan_forward
-A FORWARD -m comment --comment "!fw3" -j reject
-A OUTPUT -o lo -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -m comment --comment "!fw3: Custom output rule chain" -j output_rule
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -m comment --comment "!fw3" -j ACCEPT
-A OUTPUT -o br-lan -m comment --comment "!fw3" -j zone_lan_output
-A OUTPUT -o dsl0 -m comment --comment "!fw3" -j zone_wan_output
-A OUTPUT -o tun0 -m comment --comment "!fw3" -j zone_wan_output
-A reject -p tcp -m comment --comment "!fw3" -j REJECT --reject-with tcp-reset
-A reject -m comment --comment "!fw3" -j REJECT --reject-with icmp-port-unreachable
-A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
-A syn_flood -m comment --comment "!fw3" -j DROP
-A zone_lan_dest_ACCEPT -o br-lan -m comment --comment "!fw3" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3: Custom lan forwarding rule chain" -j forwarding_lan_rule
-A zone_lan_forward -m comment --comment "!fw3: Zone lan to wan forwarding policy" -j zone_wan_dest_ACCEPT
-A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_lan_forward -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_input -m comment --comment "!fw3: Custom lan input rule chain" -j input_lan_rule
-A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_lan_input -m comment --comment "!fw3" -j zone_lan_src_ACCEPT
-A zone_lan_output -m comment --comment "!fw3: Custom lan output rule chain" -j output_lan_rule
-A zone_lan_output -m comment --comment "!fw3" -j zone_lan_dest_ACCEPT
-A zone_lan_src_ACCEPT -i br-lan -m conntrack --ctstate NEW,UNTRACKED -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o dsl0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o dsl0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_ACCEPT -o tun0 -m conntrack --ctstate INVALID -m comment --comment "!fw3: Prevent NAT leakage" -j DROP
-A zone_wan_dest_ACCEPT -o tun0 -m comment --comment "!fw3" -j ACCEPT
-A zone_wan_dest_REJECT -o dsl0 -m comment --comment "!fw3" -j reject
-A zone_wan_dest_REJECT -o tun0 -m comment --comment "!fw3" -j reject
-A zone_wan_forward -m comment --comment "!fw3: Custom wan forwarding rule chain" -j forwarding_wan_rule
-A zone_wan_forward -p esp -m comment --comment "!fw3: Allow-IPSec-ESP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "!fw3: Allow-ISAKMP" -j zone_lan_dest_ACCEPT
-A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port forwards" -j ACCEPT
-A zone_wan_forward -m comment --comment "!fw3" -j zone_wan_dest_REJECT
-A zone_wan_input -m comment --comment "!fw3: Custom wan input rule chain" -j input_wan_rule
-A zone_wan_input -p udp -m udp --dport 68 -m comment --comment "!fw3: Allow-DHCP-Renew" -j ACCEPT
-A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment "!fw3: Allow-Ping" -j ACCEPT
-A zone_wan_input -p igmp -m comment --comment "!fw3: Allow-IGMP" -j ACCEPT
-A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "!fw3: Accept port redirections" -j ACCEPT
-A zone_wan_input -m comment --comment "!fw3" -j zone_wan_src_REJECT
-A zone_wan_output -m comment --comment "!fw3: Custom wan output rule chain" -j output_wan_rule
-A zone_wan_output -m comment --comment "!fw3" -j zone_wan_dest_ACCEPT
-A zone_wan_src_REJECT -i dsl0 -m comment --comment "!fw3" -j reject
-A zone_wan_src_REJECT -i tun0 -m comment --comment "!fw3" -j reject
COMMIT
# Completed on Tue Sep 29 01:22:04 2020
==> /etc/resolv.conf <==
search lan
nameserver 127.0.0.1
==> /tmp/resolv.conf <==
search lan
nameserver 127.0.0.1
==> /tmp/resolv.conf.auto <==
nameserver 10.9.0.1
==> /tmp/resolv.conf.auto.hold <==
# Interface lan
nameserver 192.168.1.1