Network restart caused by plugged cable?

Hi guys,

It looks to me as if LEDE restarts all interfaces (WAN, tun) when I plug the LAN cable in, what causes me problems on the OpenVPN tun adapter and it also interrupts the WAN connection for a few seconds.

System:
Lede Reboot (17.01.4, r3560-79f57e422d)
LAN = eth0 = br-lan
WAN = eth1

Un-plug LAN cable:

Wed Apr 18 20:23:11 2018 daemon.notice netifd: Network device 'eth0' link is down
Wed Apr 18 20:23:11 2018 kern.info kernel: [  151.692998] br-lan: port 1(eth0) entered disabled state
Wed Apr 18 20:23:12 2018 daemon.notice netifd: bridge 'br-lan' link is down
Wed Apr 18 20:23:12 2018 daemon.notice netifd: Interface 'lan' has link connectivity loss

Everything good so far.

Re-plug LAN cable:

Wed Apr 18 20:24:12 2018 daemon.notice netifd: Network device 'eth0' link is up
Wed Apr 18 20:24:12 2018 kern.info kernel: [  212.717460] br-lan: port 1(eth0) entered forwarding state
Wed Apr 18 20:24:12 2018 kern.info kernel: [  212.746534] br-lan: port 1(eth0) entered forwarding state
Wed Apr 18 20:24:12 2018 daemon.notice netifd: bridge 'br-lan' link is up
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'lan' has link connectivity 
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'lan' is now down
Wed Apr 18 20:24:12 2018 daemon.info odhcpd[1303]: Raising SIGUSR1 due to address change on br-lan
Wed Apr 18 20:24:12 2018 daemon.info odhcpd[1303]: Raising SIGUSR1 due to address change on br-lan
Wed Apr 18 20:24:12 2018 user.notice root: stopping ntpclient
Wed Apr 18 20:24:12 2018 kern.info kernel: [  212.798452] br-lan: port 1(eth0) entered disabled state
Wed Apr 18 20:24:12 2018 kern.info kernel: [  212.834505] device eth0 left promiscuous mode
Wed Apr 18 20:24:12 2018 kern.info kernel: [  212.882899] br-lan: port 1(eth0) entered disabled state
Wed Apr 18 20:24:12 2018 kern.info kernel: [  212.936891] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'lan' is disabled
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Network device 'eth0' link is down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: bridge 'br-lan' link is down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'lan' has link connectivity loss
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'loopback' is now down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'loopback' is disabled
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Network device 'lo' link is down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'loopback' has link connectivity loss
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'vpn1' is now down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'vpn1' is disabled
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Network device 'tun1' link is down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'vpn1' has link connectivity loss
Wed Apr 18 20:24:12 2018 daemon.notice netifd: wan (1407): udhcpc: received SIGTERM
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'wan' is now down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'wan' is disabled
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Network device 'eth1' link is down
Wed Apr 18 20:24:12 2018 daemon.notice netifd: Interface 'wan' has link connectivity loss
Wed Apr 18 20:24:12 2018 daemon.warn dnsmasq[1544]: no servers found in /tmp/resolv.conf.auto, will retry
Wed Apr 18 20:24:13 2018 user.notice : Added device handler type: 8021ad
Wed Apr 18 20:24:13 2018 user.notice : Added device handler type: 8021q
Wed Apr 18 20:24:13 2018 user.notice : Added device handler type: macvlan
Wed Apr 18 20:24:13 2018 user.notice : Added device handler type: bridge
Wed Apr 18 20:24:13 2018 user.notice : Added device handler type: Network device
Wed Apr 18 20:24:13 2018 user.notice : Added device handler type: tunnel
Wed Apr 18 20:24:14 2018 kern.info kernel: [  214.443615] device eth0 entered promiscuous mode
Wed Apr 18 20:24:14 2018 kern.info kernel: [  214.491077] br-lan: port 1(eth0) entered forwarding state
Wed Apr 18 20:24:14 2018 kern.info kernel: [  214.529412] br-lan: port 1(eth0) entered forwarding state
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'lan' is enabled
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'lan' is setting up now
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'lan' is now up
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'loopback' is enabled
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'loopback' is setting up now
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'loopback' is now up
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'vpn1' is enabled
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'wan' is enabled
Wed Apr 18 20:24:14 2018 daemon.notice netifd: bridge 'br-lan' link is up
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'lan' has link connectivity 
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Network device 'eth0' link is up
Wed Apr 18 20:24:14 2018 daemon.info odhcpd[1303]: Raising SIGUSR1 due to address change on br-lan
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Network device 'lo' link is up
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'loopback' has link connectivity 
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Network device 'tun1' link is up
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'vpn1' has link connectivity 
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'vpn1' is setting up now
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'vpn1' is now up
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Network device 'eth1' link is up
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'wan' has link connectivity 
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'wan' is setting up now
Wed Apr 18 20:24:14 2018 daemon.notice netifd: wan (1916): udhcpc: started, v1.25.1
Wed Apr 18 20:24:14 2018 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Wed Apr 18 20:24:14 2018 daemon.notice netifd: wan (1916): udhcpc: sending discover
Wed Apr 18 20:24:14 2018 daemon.notice netifd: wan (1916): udhcpc: sending select for 192.168.11.229
Wed Apr 18 20:24:14 2018 daemon.notice netifd: wan (1916): udhcpc: lease of 192.168.11.229 obtained, lease time 5184000
Wed Apr 18 20:24:14 2018 daemon.notice netifd: Interface 'wan' is now up
Wed Apr 18 20:24:14 2018 daemon.info dnsmasq[1544]: reading /tmp/resolv.conf.auto
Wed Apr 18 20:24:14 2018 daemon.info dnsmasq[1544]: using local addresses only for domain lan
Wed Apr 18 20:24:14 2018 daemon.info dnsmasq[1544]: using nameserver 192.168.11.254#53
Wed Apr 18 20:24:15 2018 daemon.info odhcpd[1303]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 18 20:24:15 2018 daemon.notice odhcpd[1303]: Failed to send to ff02::1%br-lan (Address not available)
Wed Apr 18 20:24:15 2018 daemon.notice odhcpd[1303]: Got DHCPv6 request
Wed Apr 18 20:24:15 2018 daemon.warn odhcpd[1303]: DHCPV6 SOLICIT IA_NA from 0001000122504c0800e04b624baa on br-lan: ok fd46:f2ae:caa1::e53/128 
Wed Apr 18 20:24:15 2018 daemon.notice odhcpd[1303]: Got DHCPv6 request
Wed Apr 18 20:24:15 2018 daemon.warn odhcpd[1303]: DHCPV6 REQUEST IA_NA from 0001000122504c0800e04b624baa on br-lan: ok fd46:f2ae:caa1::e53/128 
Wed Apr 18 20:24:15 2018 daemon.info dnsmasq[1544]: read /etc/hosts - 4 addresses
Wed Apr 18 20:24:15 2018 daemon.info dnsmasq[1544]: read /tmp/hosts/odhcpd - 1 addresses
Wed Apr 18 20:24:15 2018 daemon.info dnsmasq[1544]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Wed Apr 18 20:24:15 2018 daemon.info dnsmasq-dhcp[1544]: read /etc/ethers - 0 addresses
Wed Apr 18 20:24:15 2018 daemon.info odhcpd[1303]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 18 20:24:16 2018 kern.info kernel: [  216.520051] br-lan: port 1(eth0) entered forwarding state
Wed Apr 18 20:24:16 2018 daemon.info odhcpd[1303]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 18 20:24:16 2018 user.notice root: starting ntpclient
Wed Apr 18 20:24:17 2018 user.notice firewall: Reloading firewall due to ifup of vpn1 (tun1)
Wed Apr 18 20:24:17 2018 user.notice firewall: Reloading firewall due to ifup of wan (eth1)
Wed Apr 18 20:24:18 2018 daemon.notice odhcpd[1303]: Got DHCPv6 request
Wed Apr 18 20:24:18 2018 daemon.warn odhcpd[1303]: DHCPV6 CONFIRM IA_NA from 0001000122504c0800e04b624baa on br-lan: not on-link fd46:f2ae:caa1::e53/128 
Wed Apr 18 20:24:18 2018 daemon.notice odhcpd[1303]: Got DHCPv6 request
Wed Apr 18 20:24:18 2018 daemon.warn odhcpd[1303]: DHCPV6 SOLICIT IA_NA from 0001000122504c0800e04b624baa on br-lan: ok fd46:f2ae:caa1::e53/128 
Wed Apr 18 20:24:18 2018 daemon.info dnsmasq[1544]: read /etc/hosts - 4 addresses
Wed Apr 18 20:24:18 2018 daemon.info dnsmasq[1544]: read /tmp/hosts/odhcpd - 0 addresses
Wed Apr 18 20:24:18 2018 daemon.info dnsmasq[1544]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Wed Apr 18 20:24:18 2018 daemon.info dnsmasq-dhcp[1544]: read /etc/ethers - 0 addresses
Wed Apr 18 20:24:19 2018 daemon.notice odhcpd[1303]: Got DHCPv6 request
Wed Apr 18 20:24:19 2018 daemon.warn odhcpd[1303]: DHCPV6 REQUEST IA_NA from 0001000122504c0800e04b624baa on br-lan: ok fd46:f2ae:caa1::e53/128 
Wed Apr 18 20:24:19 2018 daemon.info dnsmasq[1544]: read /etc/hosts - 4 addresses
Wed Apr 18 20:24:19 2018 daemon.info dnsmasq[1544]: read /tmp/hosts/odhcpd - 1 addresses
Wed Apr 18 20:24:19 2018 daemon.info dnsmasq[1544]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Wed Apr 18 20:24:19 2018 daemon.info dnsmasq-dhcp[1544]: read /etc/ethers - 0 addresses
Wed Apr 18 20:24:19 2018 daemon.info odhcpd[1303]: Using a RA lifetime of 0 seconds on br-lan
Wed Apr 18 20:24:20 2018 daemon.info odhcpd[1303]: Using a RA lifetime of 0 seconds on br-lan

Not sure if if is like a "/etc/init.d/network restart", but the log shows that a lot of things happen on all interfaces, not only on the LAN.

Is this the way how it should be?

Yes, link layer events can cause ifup/down by default. To prevent that, you can set option force_link 1 in the config interface lan section.

Should it not just cause an ifup event on the according interface and not on all interfaces?

Usually yes, but hard to tell if the observed behaviour is correct without knowing your network configuration in detail.

I use LEDE Reboot (17.01.4, r3560-79f57e422d) in a Windows 10 Hyper-V container.
The PC has two NICs and both are connected to the Hyper-V client where LEDE is installed.

If I dis- and reconnect the Ethernet cable at of the NICs, then it re-starts all interfaces.
I did export and upload my OpenWRT Hyper-V container if someone want to test this:


user: root / password: 123456

It also happens if you have just one NIC connected to the Hyper-V client and the other interface set up as "internal" NIC on your PC if you want to test it on PC with just one NIC.

I tried to re-create this problem on a TL-WR1043nd and on a ALIX APU1D with the onboard NICs as well as with a USB NIC (also tried to disconnect the USB), but it does not happen there.

I am wondering what happens with the OpenWRT in the Hyper-V container when the NIC link gets back, what causes this issue.

Sounds to me like this is a problem with the hypervisor. Apparently it brings down the entire virtual networking when one of the associated physical links loses carrier.

This is nothing that can be fixed on the OpenWrt/LEDE side but you can work around it by setting "option force_link 1" on all ifaces.

1 Like

I have tried this option, but it still restarts all the interfaces when I plug the WAN in.

config interface 'loopback'
        option ifname 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fd46:f2ae:caa1::/48'

config interface 'lan'
        option type 'bridge'
        option ifname 'eth0'
        option proto 'static'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option ipaddr '10.1.149.6'
        option force_link 1

config interface 'wan'
        option proto 'dhcp'
        option ifname 'eth1'
        option force_link 1

config interface 'vpn1'
        option ifname 'tun1'
        option proto 'none'
        option force_link 1

Disconnect of the WAN:

Tue Apr 24 14:06:06 2018 daemon.notice netifd: Network device 'eth1' link is down
Tue Apr 24 14:06:06 2018 daemon.notice netifd: Interface 'wan' has link connectivity loss

Reconnect ot the WAN:

Tue Apr 24 14:06:24 2018 daemon.notice netifd: Network device 'eth1' link is up
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'wan' has link connectivity 
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'lan' is now down
Tue Apr 24 14:06:24 2018 daemon.info odhcpd[1306]: Raising SIGUSR1 due to address change on br-lan
Tue Apr 24 14:06:24 2018 kern.info kernel: [  789.041862] br-lan: port 1(eth0) entered disabled state
Tue Apr 24 14:06:24 2018 kern.info kernel: [  789.054961] device eth0 left promiscuous mode
Tue Apr 24 14:06:24 2018 kern.info kernel: [  789.068608] br-lan: port 1(eth0) entered disabled state
Tue Apr 24 14:06:24 2018 user.notice root: stopping ntpclient
Tue Apr 24 14:06:24 2018 kern.info kernel: [  789.092637] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'lan' is disabled
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Network device 'eth0' link is down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: bridge 'br-lan' link is down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'lan' has link connectivity loss
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'loopback' is now down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'loopback' is disabled
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Network device 'lo' link is down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'loopback' has link connectivity loss
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'vpn1' is now down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'vpn1' is disabled
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Network device 'tun1' link is down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'vpn1' has link connectivity loss
Tue Apr 24 14:06:24 2018 daemon.notice netifd: wan (2811): udhcpc: received SIGTERM
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'wan' is now down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'wan' is disabled
Tue Apr 24 14:06:24 2018 daemon.warn dnsmasq[1487]: no servers found in /tmp/resolv.conf.auto, will retry
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Network device 'eth1' link is down
Tue Apr 24 14:06:24 2018 daemon.notice netifd: Interface 'wan' has link connectivity loss
Tue Apr 24 14:06:25 2018 user.notice : Added device handler type: 8021ad
Tue Apr 24 14:06:25 2018 user.notice : Added device handler type: 8021q
Tue Apr 24 14:06:25 2018 user.notice : Added device handler type: macvlan
Tue Apr 24 14:06:25 2018 user.notice : Added device handler type: bridge
Tue Apr 24 14:06:25 2018 user.notice : Added device handler type: Network device
Tue Apr 24 14:06:25 2018 user.notice : Added device handler type: tunnel
Tue Apr 24 14:06:25 2018 kern.info kernel: [  790.398900] device eth0 entered promiscuous mode
Tue Apr 24 14:06:25 2018 kern.info kernel: [  790.410662] br-lan: port 1(eth0) entered forwarding state
Tue Apr 24 14:06:25 2018 kern.info kernel: [  790.415619] br-lan: port 1(eth0) entered forwarding state
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'lan' is enabled
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'lan' is setting up now
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'lan' is now up
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'loopback' is enabled
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'loopback' is setting up now
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'loopback' is now up
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'vpn1' is enabled
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'vpn1' is setting up now
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'vpn1' is now up
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'wan' is enabled
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'wan' is setting up now
Tue Apr 24 14:06:25 2018 daemon.notice netifd: bridge 'br-lan' link is up
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'lan' has link connectivity 
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Network device 'eth0' link is up
Tue Apr 24 14:06:25 2018 daemon.info odhcpd[1306]: Raising SIGUSR1 due to address change on br-lan
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Network device 'lo' link is up
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'loopback' has link connectivity 
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Network device 'tun1' link is up
Tue Apr 24 14:06:25 2018 daemon.notice netifd: Interface 'vpn1' has link connectivity 
Tue Apr 24 14:06:26 2018 daemon.notice netifd: Network device 'eth1' link is up
Tue Apr 24 14:06:26 2018 daemon.notice netifd: Interface 'wan' has link connectivity 
Tue Apr 24 14:06:26 2018 daemon.notice netifd: wan (3364): udhcpc: started, v1.25.1
Tue Apr 24 14:06:26 2018 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Tue Apr 24 14:06:26 2018 daemon.notice netifd: wan (3364): udhcpc: sending discover
Tue Apr 24 14:06:26 2018 daemon.notice netifd: wan (3364): udhcpc: sending select for 192.168.11.229
Tue Apr 24 14:06:26 2018 daemon.notice netifd: wan (3364): udhcpc: lease of 192.168.11.229 obtained, lease time 5184000
Tue Apr 24 14:06:26 2018 daemon.notice netifd: Interface 'wan' is now up
Tue Apr 24 14:06:26 2018 daemon.info dnsmasq[1487]: reading /tmp/resolv.conf.auto
Tue Apr 24 14:06:26 2018 daemon.info dnsmasq[1487]: using local addresses only for domain lan
Tue Apr 24 14:06:26 2018 daemon.info dnsmasq[1487]: using nameserver 192.168.11.254#53
Tue Apr 24 14:06:27 2018 daemon.info odhcpd[1306]: Using a RA lifetime of 0 seconds on br-lan
Tue Apr 24 14:06:27 2018 daemon.notice odhcpd[1306]: Failed to send to ff02::1%br-lan (Address not available)
Tue Apr 24 14:06:27 2018 kern.info kernel: [  792.410040] br-lan: port 1(eth0) entered forwarding state
Tue Apr 24 14:06:28 2018 user.notice root: starting ntpclient
Tue Apr 24 14:06:28 2018 user.notice firewall: Reloading firewall due to ifup of vpn1 (tun1)
Tue Apr 24 14:06:28 2018 user.notice firewall: Reloading firewall due to ifup of wan (eth1)
Tue Apr 24 14:06:34 2018 daemon.notice openvpn(ctb_client)[3044]: [CTB Automation GmbH VPN1 VPN Server] Inactivity timeout (--ping-restart), restarting
Tue Apr 24 14:06:34 2018 daemon.notice openvpn(ctb_client)[3044]: SIGUSR1[soft,ping-restart] received, process restarting
Tue Apr 24 14:06:34 2018 daemon.notice openvpn(ctb_client)[3044]: Restart pause, 5 second(s)
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: TCP/UDP: Preserving recently used remote address: [AF_INET]151.236.8.117:1200
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: Socket Buffers: R=[212992->425984] S=[212992->425984]
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: UDP link local: (not bound)
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: UDP link remote: [AF_INET]151.236.8.117:1200
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: TLS: Initial packet from [AF_INET]151.236.8.117:1200, sid=d3c7cf50 8daa6ac3
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: VERIFY OK: depth=3, C=AT, ST=Styria, L=Lebring, O=CTB Automation GmbH, OU=Administration, CN=CTB Automation GmbH - CA, emailAddress=administrator@ctb.co.at
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: VERIFY OK: depth=2, C=AT, ST=Styria, L=Lebring, O=CTB Automation GmbH, OU=Administration, CN=CTB Automation GmbH - VPN CA, emailAddress=administrator@ctb.co.at
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: VERIFY OK: depth=1, C=AT, ST=Styria, L=Lebring, O=CTB Automation GmbH, OU=Administration, CN=CTB Automation GmbH - VPN1 VPN CA, emailAddress=administrator@ctb.co.at
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: VERIFY KU OK
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: Validating certificate extended key usage
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: VERIFY EKU OK
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: VERIFY OK: depth=0, C=AT, ST=Styria, L=Lebring, O=CTB Automation GmbH, OU=Administration, CN=CTB Automation GmbH VPN1 VPN Server, emailAddress=administrator@ctb.co.at
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Tue Apr 24 14:06:39 2018 daemon.notice openvpn(ctb_client)[3044]: [CTB Automation GmbH VPN1 VPN Server] Peer Connection Initiated with [AF_INET]151.236.8.117:1200
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: SENT CONTROL [CTB Automation GmbH VPN1 VPN Server]: 'PUSH_REQUEST' (status=1)
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo,sndbuf 393216,rcvbuf 393216,route 10.102.0.1,topology net30,ping 9,ping-restart 30,route 10.1.0.0 255.255.0.0,route 10.100.0.0 255.255.0.0,route 10.101.0.0 255.255.0.0,route 10.102.0.0 255.255.0.0,ifconfig 10.102.0.10 10.102.0.9,peer-id 5,cipher AES-256-GCM'
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: timers and/or timeouts modified
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: compression parms modified
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: Socket Buffers: R=[425984->425984] S=[425984->425984]
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: --ifconfig/up options modified
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: route options modified
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: peer-id set
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: adjusting link_mtu to 1629
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: OPTIONS IMPORT: data channel crypto options modified
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: Preserving previous TUN/TAP instance: tun1
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route del -net 10.102.0.1 netmask 255.255.255.255
Tue Apr 24 14:06:40 2018 daemon.warn openvpn(ctb_client)[3044]: ERROR: Linux route delete command failed: external program exited with error status: 1
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route del -net 10.1.0.0 netmask 255.255.0.0
Tue Apr 24 14:06:40 2018 daemon.warn openvpn(ctb_client)[3044]: ERROR: Linux route delete command failed: external program exited with error status: 1
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route del -net 10.100.0.0 netmask 255.255.0.0
Tue Apr 24 14:06:40 2018 daemon.warn openvpn(ctb_client)[3044]: ERROR: Linux route delete command failed: external program exited with error status: 1
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route del -net 10.101.0.0 netmask 255.255.0.0
Tue Apr 24 14:06:40 2018 daemon.warn openvpn(ctb_client)[3044]: ERROR: Linux route delete command failed: external program exited with error status: 1
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route del -net 10.102.0.0 netmask 255.255.0.0
Tue Apr 24 14:06:40 2018 daemon.warn openvpn(ctb_client)[3044]: ERROR: Linux route delete command failed: external program exited with error status: 1
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: Closing TUN/TAP interface
Tue Apr 24 14:06:40 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/ifconfig tun1 0.0.0.0
Tue Apr 24 14:06:40 2018 daemon.notice netifd: Network device 'tun1' link is down
Tue Apr 24 14:06:40 2018 daemon.notice netifd: Interface 'vpn1' has link connectivity loss
Tue Apr 24 14:06:40 2018 daemon.notice netifd: Interface 'vpn1' is now down
Tue Apr 24 14:06:40 2018 daemon.notice netifd: Interface 'vpn1' is disabled
Tue Apr 24 14:06:40 2018 user.notice root: stopping ntpclient
Tue Apr 24 14:06:41 2018 daemon.info odhcpd[1306]: Using a RA lifetime of 0 seconds on br-lan
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: TUN/TAP device tun1 opened
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: TUN/TAP TX queue length set to 100
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/ifconfig tun1 10.102.0.10 pointopoint 10.102.0.9 mtu 1500
Tue Apr 24 14:06:41 2018 daemon.notice netifd: Interface 'vpn1' is enabled
Tue Apr 24 14:06:41 2018 daemon.notice netifd: Interface 'vpn1' is setting up now
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route add -net 10.102.0.1 netmask 255.255.255.255 gw 10.102.0.9
Tue Apr 24 14:06:41 2018 daemon.notice netifd: Interface 'vpn1' is now up
Tue Apr 24 14:06:41 2018 daemon.notice netifd: Network device 'tun1' link is up
Tue Apr 24 14:06:41 2018 daemon.notice netifd: Interface 'vpn1' has link connectivity 
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route add -net 10.1.0.0 netmask 255.255.0.0 gw 10.102.0.9
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route add -net 10.100.0.0 netmask 255.255.0.0 gw 10.102.0.9
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route add -net 10.101.0.0 netmask 255.255.0.0 gw 10.102.0.9
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: /sbin/route add -net 10.102.0.0 netmask 255.255.0.0 gw 10.102.0.9
Tue Apr 24 14:06:41 2018 daemon.notice openvpn(ctb_client)[3044]: Initialization Sequence Completed
Tue Apr 24 14:06:41 2018 user.notice firewall: Reloading firewall due to ifup of vpn1 (tun1)
Tue Apr 24 14:06:41 2018 user.notice root: starting ntpclient
Tue Apr 24 14:06:42 2018 daemon.info odhcpd[1306]: Using a RA lifetime of 0 seconds on br-lan