I tried your solution, it works fantastic, but there are some issues that I do not know how to solve them.
First I should mention that I have to execute up-all and down-all script command, I mean up_script and ovpn-update-resolv-7 together and likewise for down_script and ovpn-update-resolv-7 in order to access some website such as youtube.
I do not have any clue why youtube only shows online if the router (tun0) only uses its own VPN DNS server.
That said I tweaked the down_script from
# restart routing optional
service network restart
to
# reload routing optional
service network reload
Since service network restart disconnects every iface, please correct me if I am wrong.
I would like to have all the DNS requests from the users of tun0 goes via the tun0 fetched DNS server (which is desirable) and not other DNS servers.
I have checked the DNS servers on the ipleak.net for LAN attached devices and I could confirm that since only the ip addresses similar to the VPN public IP was resolved as DNS server which is wise and desirable.
That said I am wondering if those DNS servers are pushed for the router device or the internal proxy server as well or not?
How can I check that, I mean is there something like ipleak.net for openwrt cli or not?
Due to a lot of internet disruptions with the ISP I have realised that if internet gets interrupted the openvpn client cannot recover (I have no clue how the openvpn service deals with disconnections , does it execute down_script or not).
Anyways for the mentioned case the openvpn syslog will loop throught following messages,
Mon Feb 12 18:02:52 2024 daemon.warn openvpn(homebrew_windscribe_swe[13158]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Feb 12 18:02:52 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 12 18:02:52 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 12 18:02:52 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1081
Mon Feb 12 18:02:52 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Attempting to establish TCP connection with [AF_INET]127.0.0.1:1081 [nonblock]
Mon Feb 12 18:02:52 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: TCP connection established with [AF_INET]127.0.0.1:1081
Mon Feb 12 18:02:52 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: TCP_CLIENT link local: (not bound)
Mon Feb 12 18:02:52 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: TCP_CLIENT link remote: [AF_INET]127.0.0.1:1081
Mon Feb 12 18:02:57 2024 daemon.err openvpn(homebrew_windscribe_swe[13158]: Connection reset, restarting [-1]
Mon Feb 12 18:02:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: SIGUSR1[soft,connection-reset] received, process restarting
Mon Feb 12 18:04:41 2024 daemon.warn odhcpd[1640]: No default route present, overriding ra_lifetime!
I think for the above case the tun0 does not execute down-all script.
Anyways I would like to know if there is any smart solution that makes the router recover from the unresponsive tun0.
I presume the tun0 should get constantly monitored for internet connection, once it is down an outside script should manually get triggered that first gives the proxy server a grace time to recover from disconnection and then restablishes tun0 connection again.
Any assistance that could deals with ISP disconnection is really appreciated.
That said I have collected following log messages for different cases,
Case 1 [Not using the ovpn-update-resolv-7 script]
Sat Feb 10 20:37:41 2024 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: www.youtube.com
Sat Feb 10 20:37:54 2024 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: accounts.youtube.com
Sat Feb 10 20:37:54 2024 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: accounts.youtube.com
Case 2 [Interruptions from the ISP that case the proxy server and consequently the openvpn client to fail - In order to recover the openvpn service should stop and then it shoud wait for proxy server to recover and then openvpn client should restarts again]
Mon Feb 12 16:25:15 2024 daemon.notice netifd: Network device 'lan1' link is up
Mon Feb 12 16:25:16 2024 daemon.warn odhcpd[1640]: No default route present, overriding ra_lifetime!
Mon Feb 12 16:25:17 2024 daemon.warn odhcpd[1640]: No default route present, overriding ra_lifetime!
Mon Feb 12 16:25:18 2024 daemon.warn odhcpd[1640]: No default route present, overriding ra_lifetime!
Mon Feb 12 16:25:26 2024 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 192.168.50.115 1c:61:b4:89:dc:b9
Mon Feb 12 16:25:26 2024 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.50.115 1c:61:b4:89:dc:b9
Mon Feb 12 16:25:26 2024 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.50.115 1c:61:b4:89:dc:b9
Mon Feb 12 16:25:26 2024 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.50.115 1c:61:b4:89:dc:b9 TAB-SFPR7
Mon Feb 12 16:26:57 2024 daemon.warn openvpn(homebrew_windscribe_swe[10256]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1081
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: Attempting to establish TCP connection with [AF_INET]127.0.0.1:1081 [nonblock]
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP connection established with [AF_INET]127.0.0.1:1081
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP_CLIENT link local: (not bound)
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP_CLIENT link remote: [AF_INET]127.0.0.1:1081
Mon Feb 12 16:27:02 2024 daemon.err openvpn(homebrew_windscribe_swe[10256]: Connection reset, restarting [-1]
Mon Feb 12 16:27:02 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: SIGUSR1[soft,connection-reset] received, process restarting
Case 3 [manually restarting openvpn service, please consult the DHCP range and some issues with the dnsmasqfull]
Mon Feb 12 16:26:57 2024 daemon.warn openvpn(homebrew_windscribe_swe[10256]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1081
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: Attempting to establish TCP connection with [AF_INET]127.0.0.1:1081 [nonblock]
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP connection established with [AF_INET]127.0.0.1:1081
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP_CLIENT link local: (not bound)
Mon Feb 12 16:26:57 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: TCP_CLIENT link remote: [AF_INET]127.0.0.1:1081
Mon Feb 12 16:27:02 2024 daemon.err openvpn(homebrew_windscribe_swe[10256]: Connection reset, restarting [-1]
Mon Feb 12 16:27:02 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: SIGUSR1[soft,connection-reset] received, process restarting
Mon Feb 12 16:27:17 2024 daemon.err uhttpd[1767]: [info] luci: accepted login on / for root from 192.168.50.115
Mon Feb 12 16:27:29 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Mon Feb 12 16:27:39 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Mon Feb 12 16:27:45 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Mon Feb 12 16:27:52 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Mon Feb 12 16:28:07 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Mon Feb 12 16:28:31 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: /usr/libexec/openvpn-hotplug route-pre-down homebrew_windscribe_swe tun0 0 0 10.124.148.30 255.255.254.0 init
Mon Feb 12 16:28:31 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: Closing TUN/TAP interface
Mon Feb 12 16:28:31 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: net_addr_v4_del: 10.124.148.30 dev tun0
Mon Feb 12 16:28:31 2024 daemon.notice ttyd[5909]: [2024/02/12 16:28:31:9527] N: rops_handle_POLLIN_netlink: DELADDR
Mon Feb 12 16:28:31 2024 daemon.notice netifd: Network device 'tun0' link is down
Mon Feb 12 16:28:31 2024 daemon.notice netifd: Interface 'VPNTun' has link connectivity loss
Mon Feb 12 16:28:31 2024 daemon.notice netifd: Interface 'VPNTun' is now down
Mon Feb 12 16:28:31 2024 daemon.notice ttyd[5909]: [2024/02/12 16:28:31:9576] N: rops_handle_POLLIN_netlink: DELADDR
Mon Feb 12 16:28:32 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: /usr/libexec/openvpn-hotplug down homebrew_windscribe_swe tun0 0 0 10.124.148.30 255.255.254.0 init
Mon Feb 12 16:28:32 2024 daemon.notice openvpn(homebrew_windscribe_swe[10256]: SIGTERM[hard,init_instance] received, process exiting
Mon Feb 12 16:28:32 2024 daemon.notice netifd: Interface 'VPNTun' is disabled
Mon Feb 12 16:28:32 2024 user.notice ovpn-update-resolv-7[12265]: Default DNS server(s) restored
Mon Feb 12 16:28:32 2024 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Mon Feb 12 16:28:33 2024 user.notice ovpn-update-resolv-7[12265]: udhcpc: started, v1.36.1
Mon Feb 12 16:28:33 2024 user.notice ovpn-update-resolv-7[12265]: udhcpc: broadcasting discover
Mon Feb 12 16:28:36 2024 user.notice ovpn-update-resolv-7[12265]: udhcpc: no lease, failing
Mon Feb 12 16:28:36 2024 daemon.info dnsmasq[1]: started, version 2.89 cachesize 1000
Mon Feb 12 16:28:36 2024 daemon.info dnsmasq[1]: DNS service limited to local subnets
Mon Feb 12 16:28:36 2024 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Mon Feb 12 16:28:36 2024 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Mon Feb 12 16:30:35 2024 daemon.warn openvpn(homebrew_windscribe_swe[13158]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: VERIFY OK: depth=2, C=CA, ST=ON, L=Toronto, O=Windscribe Limited, OU=Systems, CN=Windscribe Node CA X1
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: VERIFY OK: depth=1, C=CA, ST=ON, L=Toronto, O=Windscribe Limited, OU=Systems, CN=Windscribe Node CA X2
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: VERIFY KU OK
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Validating certificate extended key usage
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: VERIFY EKU OK
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: VERIFY X509NAME OK: C=CA, ST=ON, L=Toronto, O=Windscribe Limited, OU=Systems, CN=arn-30.windscribe.com
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: VERIFY OK: depth=0, C=CA, ST=ON, L=Toronto, O=Windscribe Limited, OU=Systems, CN=arn-30.windscribe.com
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: [arn-30.windscribe.com] Peer Connection Initiated with [AF_INET]127.0.0.1:1081
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: TUN/TAP device tun0 opened
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: net_iface_mtu_set: mtu 1500 for tun0
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: net_iface_up: set tun0 up
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: net_addr_v4_add: 10.124.148.117/23 dev tun0
Mon Feb 12 16:30:35 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: /usr/libexec/openvpn-hotplug up homebrew_windscribe_swe tun0 1500 1626 10.124.148.117 255.255.254.0 init
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' is enabled
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Network device 'tun0' link is up
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' has link connectivity
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' is setting up now
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' is now up
Mon Feb 12 16:30:36 2024 user.notice egc: ovpn-pbr-up uses interface:[tun0] = tun0 interface-up
Mon Feb 12 16:30:36 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Initialization Sequence Completed
Mon Feb 12 16:30:36 2024 user.notice ovpn-update-resolv-7[13285]: Exclusively using openvpn DNS server(s) from /tmp/resolv_conf.vpn
Mon Feb 12 16:30:36 2024 user.notice firewall: Reloading firewall due to ifup of VPNTun (tun0)
Mon Feb 12 16:30:36 2024 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Mon Feb 12 16:30:36 2024 user.notice ovpn-update-resolv-7[13285]: udhcpc: started, v1.36.1
Mon Feb 12 16:30:36 2024 user.notice ovpn-update-resolv-7[13285]: udhcpc: broadcasting discover
Mon Feb 12 16:30:39 2024 user.notice ovpn-update-resolv-7[13285]: udhcpc: no lease, failing
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: started, version 2.89 cachesize 1000
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: DNS service limited to local subnets
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.50.100 -- 192.168.50.249, lease time 12h (((((---- Why range 100-249 ----?))
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' is enabled
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Network device 'tun0' link is up
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' has link connectivity
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' is setting up now
Mon Feb 12 16:30:35 2024 daemon.notice netifd: Interface 'VPNTun' is now up
Mon Feb 12 16:30:36 2024 user.notice egc: ovpn-pbr-up uses interface:[tun0] = tun0 interface-up
Mon Feb 12 16:30:36 2024 daemon.notice openvpn(homebrew_windscribe_swe[13158]: Initialization Sequence Completed
Mon Feb 12 16:30:36 2024 user.notice ovpn-update-resolv-7[13285]: Exclusively using openvpn DNS server(s) from /tmp/resolv_conf.vpn
Mon Feb 12 16:30:36 2024 user.notice firewall: Reloading firewall due to ifup of VPNTun (tun0)
Mon Feb 12 16:30:36 2024 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Mon Feb 12 16:30:36 2024 user.notice ovpn-update-resolv-7[13285]: udhcpc: started, v1.36.1
Mon Feb 12 16:30:36 2024 user.notice ovpn-update-resolv-7[13285]: udhcpc: broadcasting discover
Mon Feb 12 16:30:39 2024 user.notice ovpn-update-resolv-7[13285]: udhcpc: no lease, failing
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: started, version 2.89 cachesize 1000
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: DNS service limited to local subnets
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset nftset auth cryptohash DNSSEC no-ID loop-detect inotify dumpfile
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.50.100 -- 192.168.50.249, lease time 12h
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: reading /tmp/resolv_conf.vpn
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using nameserver 10.255.255.3#53
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
Mon Feb 12 16:30:39 2024 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Mon Feb 12 16:33:25 2024 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Mon Feb 12 16:33:35 2024 daemon.warn odhcpd[1640]: No default route present, overriding ra_lifetime!
Kindly give me a clue on how to tackle ISP interruption issues.
Thanks