Tue Jul 8 08:03:05 2025 daemon.notice openvpn(new)[4373]: OpenVPN 2.5.8 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Tue Jul 8 08:03:05 2025 daemon.notice openvpn(new)[4373]: library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
Tue Jul 8 08:03:05 2025 daemon.warn openvpn(new)[4373]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jul 8 08:03:05 2025 daemon.warn openvpn(new)[4373]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Jul 8 08:03:05 2025 daemon.warn openvpn(new)[4373]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1260)
Tue Jul 8 08:03:10 2025 daemon.err openvpn(new)[4373]: RESOLVE: Cannot resolve host address: vpn.mobilehop.com:1194 (Try again)
Tue Jul 8 08:03:15 2025 daemon.err openvpn(new)[4373]: RESOLVE: Cannot resolve host address: vpn.mobilehop.com:1194 (Try again)
Tue Jul 8 08:03:15 2025 daemon.warn openvpn(new)[4373]: Could not determine IPv4/IPv6 protocol
Tue Jul 8 08:03:15 2025 daemon.notice openvpn(new)[4373]: SIGUSR1[soft,init_instance] received, process restarting
Tue Jul 8 08:03:15 2025 daemon.notice openvpn(new)[4373]: Restart pause, 5 second(s)
Tue Jul 8 08:03:20 2025 daemon.warn openvpn(new)[4373]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jul 8 08:03:20 2025 daemon.warn openvpn(new)[4373]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Jul 8 08:03:20 2025 daemon.warn openvpn(new)[4373]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1260)
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.90.8:1194
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: UDP link local: (not bound)
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: UDP link remote: [AF_INET]199.188.90.8:1194
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: TLS: Initial packet from [AF_INET]199.188.90.8:1194, sid=a1636d33 503f9a5e
Tue Jul 8 08:03:20 2025 daemon.warn openvpn(new)[4373]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: VERIFY OK: depth=2, C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: VERIFY OK: depth=1, C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication CA DV R36
Tue Jul 8 08:03:20 2025 daemon.notice openvpn(new)[4373]: VERIFY OK: depth=0, CN=4gvpn.net
Tue Jul 8 08:03:21 2025 daemon.notice openvpn(new)[4373]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA384
Tue Jul 8 08:03:21 2025 daemon.notice openvpn(new)[4373]: [4gvpn.net] Peer Connection Initiated with [AF_INET]199.188.90.8:1194
Tue Jul 8 08:03:22 2025 daemon.notice openvpn(new)[4373]: SENT CONTROL [4gvpn.net]: 'PUSH_REQUEST' (status=1)
Tue Jul 8 08:13:02 2025 daemon.notice openvpn(new)[4373]: SENT CONTROL [4gvpn.net]: 'PUSH_REQUEST' (status=1)
Tue Jul 8 08:13:02 2025 daemon.notice openvpn(new)[4373]: [4gvpn.net] Inactivity timeout (--ping-restart), restarting
Tue Jul 8 08:13:02 2025 daemon.notice openvpn(new)[4373]: SIGUSR1[soft,ping-restart] received, process restarting
Tue Jul 8 08:13:02 2025 daemon.notice openvpn(new)[4373]: Restart pause, 5 second(s)
Tue Jul 8 08:13:07 2025 daemon.warn openvpn(new)[4373]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jul 8 08:13:07 2025 daemon.warn openvpn(new)[4373]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Jul 8 08:13:07 2025 daemon.warn openvpn(new)[4373]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1260)
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.90.8:1194
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: UDP link local: (not bound)
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: UDP link remote: [AF_INET]199.188.90.8:1194
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: TLS: Initial packet from [AF_INET]199.188.90.8:1194, sid=d0574731 a3d7aa3b
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: VERIFY OK: depth=2, C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: VERIFY OK: depth=1, C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication CA DV R36
Tue Jul 8 08:13:07 2025 daemon.notice openvpn(new)[4373]: VERIFY OK: depth=0, CN=4gvpn.net
Tue Jul 8 08:13:08 2025 daemon.notice openvpn(new)[4373]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA384
Tue Jul 8 08:13:08 2025 daemon.notice openvpn(new)[4373]: [4gvpn.net] Peer Connection Initiated with [AF_INET]199.188.90.8:1194
Tue Jul 8 08:13:09 2025 daemon.notice openvpn(new)[4373]: SENT CONTROL [4gvpn.net]: 'PUSH_REQUEST' (status=1)
Tue Jul 8 08:13:14 2025 daemon.notice openvpn(new)[4373]: SENT CONTROL [4gvpn.net]: 'PUSH_REQUEST' (status=1)
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 192.168.1.157 192.168.1.158,dhcp-option DOMAIN lan,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.158,redirect-gateway def1'
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: OPTIONS IMPORT: timers and/or timeouts modified
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: OPTIONS IMPORT: --ifconfig/up options modified
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: OPTIONS IMPORT: route options modified
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: OPTIONS IMPORT: route-related options modified
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: Using peer cipher 'AES-128-CBC'
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_route_v4_best_gw query: dst 0.0.0.0
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_route_v4_best_gw result: via 192.168.0.1 dev wan
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: TUN/TAP device tun0 opened
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_iface_mtu_set: mtu 1260 for tun0
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_iface_up: set tun0 up
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_addr_ptp_v4_add: 192.168.1.157 peer 192.168.1.158 dev tun0
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: /usr/libexec/openvpn-hotplug up new tun0 1260 1381 192.168.1.157 192.168.1.158 init
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_route_v4_add: 199.188.90.8/32 via 192.168.0.1 dev [NULL] table 0 metric -1
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_route_v4_add: 0.0.0.0/1 via 192.168.1.158 dev [NULL] table 0 metric -1
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: net_route_v4_add: 128.0.0.0/1 via 192.168.1.158 dev [NULL] table 0 metric -1
Tue Jul 8 08:13:17 2025 daemon.notice openvpn(new)[4373]: Initialization Sequence Completed
Tue Jul 8 08:22:40 2025 daemon.err openvpn(new)[4373]: event_wait : Interrupted system call (code=4)
Tue Jul 8 08:22:40 2025 daemon.notice openvpn(new)[4373]: /usr/libexec/openvpn-hotplug route-pre-down new tun0 1260 1381 192.168.1.157 192.168.1.158 init
Tue Jul 8 08:22:40 2025 daemon.notice openvpn(new)[4373]: net_route_v4_del: 199.188.90.8/32 via 192.168.0.1 dev [NULL] table 0 metric -1
Tue Jul 8 08:22:40 2025 daemon.notice openvpn(new)[4373]: net_route_v4_del: 0.0.0.0/1 via 192.168.1.158 dev [NULL] table 0 metric -1
Tue Jul 8 08:22:40 2025 daemon.notice openvpn(new)[4373]: net_route_v4_del: 128.0.0.0/1 via 192.168.1.158 dev [NULL] table 0 metric -1
Tue Jul 8 08:22:40 2025 daemon.notice openvpn(new)[4373]: Closing TUN/TAP interface
Tue Jul 8 08:22:40 2025 daemon.notice openvpn(new)[4373]: net_addr_ptp_v4_del: 192.168.1.157 dev tun0
Tue Jul 8 08:22:41 2025 daemon.notice openvpn(new)[4373]: /usr/libexec/openvpn-hotplug down new tun0 1260 1381 192.168.1.157 192.168.1.158 init
Tue Jul 8 08:22:41 2025 daemon.notice openvpn(new)[4373]: SIGTERM[hard,] received, process exiting
Tue Jul 8 08:22:46 2025 daemon.warn openvpn(new)[8113]: Multiple --up scripts defined. The previously configured script is overridden.
Tue Jul 8 08:22:46 2025 daemon.warn openvpn(new)[8113]: Multiple --down scripts defined. The previously configured script is overridden.
Tue Jul 8 08:22:46 2025 daemon.notice openvpn(new)[8113]: OpenVPN 2.5.8 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Tue Jul 8 08:22:46 2025 daemon.notice openvpn(new)[8113]: library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
Tue Jul 8 08:22:46 2025 daemon.warn openvpn(new)[8113]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jul 8 08:22:46 2025 daemon.warn openvpn(new)[8113]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Jul 8 08:22:46 2025 daemon.warn openvpn(new)[8113]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1260)
Tue Jul 8 08:22:46 2025 daemon.notice openvpn(new)[8113]: TCP/UDP: Preserving recently used remote address: [AF_INET]199.188.90.8:1194
Tue Jul 8 08:22:46 2025 daemon.notice openvpn(new)[8113]: Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jul 8 08:22:46 2025 daemon.notice openvpn(new)[8113]: UDP link local: (not bound)
Tue Jul 8 08:22:46 2025 daemon.notice openvpn(new)[8113]: UDP link remote: [AF_INET]199.188.90.8:1194
Tue Jul 8 08:22:47 2025 daemon.notice openvpn(new)[8113]: TLS: Initial packet from [AF_INET]199.188.90.8:1194, sid=fb48946c fac48984
Tue Jul 8 08:22:47 2025 daemon.warn openvpn(new)[8113]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Jul 8 08:22:47 2025 daemon.notice openvpn(new)[8113]: VERIFY OK: depth=2, C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46
Tue Jul 8 08:22:47 2025 daemon.notice openvpn(new)[8113]: VERIFY OK: depth=1, C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication CA DV R36
Tue Jul 8 08:22:47 2025 daemon.notice openvpn(new)[8113]: VERIFY OK: depth=0, CN=4gvpn.net
Tue Jul 8 08:22:47 2025 daemon.notice openvpn(new)[8113]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA384
Tue Jul 8 08:22:47 2025 daemon.notice openvpn(new)[8113]: [4gvpn.net] Peer Connection Initiated with [AF_INET]199.188.90.8:1194
Tue Jul 8 08:22:48 2025 daemon.notice openvpn(new)[8113]: SENT CONTROL [4gvpn.net]: 'PUSH_REQUEST' (status=1)
Tue Jul 8 08:22:53 2025 daemon.notice openvpn(new)[8113]: SENT CONTROL [4gvpn.net]: 'PUSH_REQUEST' (status=1)
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 192.168.1.157 192.168.1.158,dhcp-option DOMAIN lan,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.158,redirect-gateway def1'
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: OPTIONS IMPORT: timers and/or timeouts modified
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: OPTIONS IMPORT: --ifconfig/up options modified
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: OPTIONS IMPORT: route options modified
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: OPTIONS IMPORT: route-related options modified
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: Using peer cipher 'AES-128-CBC'
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_route_v4_best_gw query: dst 0.0.0.0
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_route_v4_best_gw result: via 192.168.0.1 dev wan
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: TUN/TAP device tun0 opened
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_iface_mtu_set: mtu 1260 for tun0
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_iface_up: set tun0 up
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_addr_ptp_v4_add: 192.168.1.157 peer 192.168.1.158 dev tun0
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: /usr/libexec/openvpn-hotplug up new tun0 1260 1381 192.168.1.157 192.168.1.158 init
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_route_v4_add: 199.188.90.8/32 via 192.168.0.1 dev [NULL] table 0 metric -1
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_route_v4_add: 0.0.0.0/1 via 192.168.1.158 dev [NULL] table 0 metric -1
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: net_route_v4_add: 128.0.0.0/1 via 192.168.1.158 dev [NULL] table 0 metric -1
Tue Jul 8 08:22:55 2025 daemon.notice openvpn(new)[8113]: Initialization Sequence Completed
Tue Jul 8 08:22:55 2025 user.notice ovpn-update-resolv-9[8308]: OpenVPN up: Exclusively using openvpn DNS server(s) from /tmp/resolv_conf.vpn: nameserver 192.168.1.1