OpenVPN On OpenWRT

i changed br-lan to 192.168.2.1 but still in logs i can see it says Linux route add command failed
im gona Reset factory and test it again some config files use existing confs to build themselves so i want to fix wifi client and interface then go for VPN
EDIT:
i reset factory router and didnt setup a extra SSID for connecting people to wifi i use wifi now just to get internet for router and i installed open vpn again

root@OpenWrt:~# logread -e openvpn; netstat -l -n -p | grep -e openvpn
Sat Sep 16 17:27:29 2023 daemon.warn openvpn(Puria)[4568]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: OpenVPN 2.5.7 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: library versions: OpenSSL 1.1.1v  1 Aug 2023, LZO 2.10
Sat Sep 16 17:27:29 2023 daemon.warn openvpn(Puria)[4568]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: TCP/UDP: Preserving recently used remote address: [AF_INET]78.39.46.39:1194
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: Attempting to establish TCP connection with [AF_INET]78.39.46.39:1194 [nonblock]
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: TCP connection established with [AF_INET]78.39.46.39:1194
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: TCP_CLIENT link local: (not bound)
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: TCP_CLIENT link remote: [AF_INET]78.39.46.39:1194
Sat Sep 16 17:27:29 2023 daemon.notice openvpn(Puria)[4568]: TLS: Initial packet from [AF_INET]78.39.46.39:1194, sid=e891a8f5 6c3475e4
Sat Sep 16 17:27:31 2023 daemon.notice openvpn(Puria)[4568]: VERIFY OK: depth=1, CN=Soheil
Sat Sep 16 17:27:31 2023 daemon.notice openvpn(Puria)[4568]: VERIFY KU OK
Sat Sep 16 17:27:31 2023 daemon.notice openvpn(Puria)[4568]: Validating certificate extended key usage
Sat Sep 16 17:27:31 2023 daemon.notice openvpn(Puria)[4568]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 16 17:27:31 2023 daemon.notice openvpn(Puria)[4568]: VERIFY EKU OK
Sat Sep 16 17:27:31 2023 daemon.notice openvpn(Puria)[4568]: VERIFY OK: depth=0, CN=*.Soheil
Sat Sep 16 17:27:32 2023 daemon.warn openvpn(Puria)[4568]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1499'
Sat Sep 16 17:27:32 2023 daemon.warn openvpn(Puria)[4568]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1440'
Sat Sep 16 17:27:32 2023 daemon.notice openvpn(Puria)[4568]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Sat Sep 16 17:27:32 2023 daemon.notice openvpn(Puria)[4568]: [*.Soheil] Peer Connection Initiated with [AF_INET]78.39.46.39:1194
Sat Sep 16 17:27:33 2023 daemon.notice openvpn(Puria)[4568]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sat Sep 16 17:27:33 2023 daemon.notice openvpn(Puria)[4568]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sat Sep 16 17:27:33 2023 daemon.notice openvpn(Puria)[4568]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sat Sep 16 17:27:33 2023 daemon.notice openvpn(Puria)[4568]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sat Sep 16 17:27:34 2023 daemon.notice openvpn(Puria)[4568]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sat Sep 16 17:27:34 2023 daemon.notice openvpn(Puria)[4568]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sat Sep 16 17:27:38 2023 daemon.notice openvpn(Puria)[4568]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sat Sep 16 17:27:43 2023 daemon.notice openvpn(Puria)[4568]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,ping 20,ping-restart 60,topology subnet,route-gateway 172.20.112.107,ifconfig 192.168.200.152 255.255.255.0'
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: OPTIONS IMPORT: timers and/or timeouts modified
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: OPTIONS IMPORT: --ifconfig/up options modified
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: OPTIONS IMPORT: route-related options modified
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: Using peer cipher 'AES-256-CBC'
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_route_v4_best_gw query: dst 0.0.0.0
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan0
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: TUN/TAP device tun0 opened
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: do_ifconfig, ipv4=1, ipv6=0
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_iface_mtu_set: mtu 1500 for tun0
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_iface_up: set tun0 up
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_addr_v4_add: 192.168.200.152/24 dev tun0
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: /usr/libexec/openvpn-hotplug up Puria tun0 1500 1623 192.168.200.152 255.255.255.0 init
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_route_v4_add: 78.39.46.39/32 via 192.168.1.1 dev [NULL] table 0 metric -1
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_route_v4_add: 0.0.0.0/1 via 172.20.112.107 dev [NULL] table 0 metric -1
Sat Sep 16 17:27:44 2023 daemon.warn openvpn(Puria)[4568]: sitnl_send: rtnl: generic error (-128): Network unreachable
Sat Sep 16 17:27:44 2023 daemon.warn openvpn(Puria)[4568]: ERROR: Linux route add command failed
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: net_route_v4_add: 128.0.0.0/1 via 172.20.112.107 dev [NULL] table 0 metric -1
Sat Sep 16 17:27:44 2023 daemon.warn openvpn(Puria)[4568]: sitnl_send: rtnl: generic error (-128): Network unreachable
Sat Sep 16 17:27:44 2023 daemon.warn openvpn(Puria)[4568]: ERROR: Linux route add command failed
Sat Sep 16 17:27:44 2023 daemon.notice openvpn(Puria)[4568]: Initialization Sequence Completed

Your VPN provider is pushing a route-gateway 172.20.112.107 which seems wrong.
You have to inquire with your VPN provider about this.
In the mean time you can try the following but it is doubtful if it will work, add to your openvpn config:

pull-filter ignore "route-gateway"
redirect-gateway def1
1 Like

well i got just new logs still not working
i added these 2 line at end of my config file

Sun Sep 17 12:15:11 2023 daemon.warn openvpn(Puria)[5794]: WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
Sun Sep 17 12:15:11 2023 daemon.warn openvpn(Puria)[5794]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: OpenVPN 2.5.7 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: library versions: wolfSSL 5.6.3
Sun Sep 17 12:15:11 2023 daemon.warn openvpn(Puria)[5794]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: TCP/UDP: Preserving recently used remote address: [AF_INET]78.39.46.39:1194
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sun Sep 17 12:15:11 2023 daemon.notice openvpn(Puria)[5794]: Attempting to establish TCP connection with [AF_INET]78.39.46.39:1194 [nonblock]
Sun Sep 17 12:15:12 2023 daemon.notice openvpn(Puria)[5794]: TCP connection established with [AF_INET]78.39.46.39:1194
Sun Sep 17 12:15:12 2023 daemon.notice openvpn(Puria)[5794]: TCP_CLIENT link local: (not bound)
Sun Sep 17 12:15:12 2023 daemon.notice openvpn(Puria)[5794]: TCP_CLIENT link remote: [AF_INET]78.39.46.39:1194
Sun Sep 17 12:15:12 2023 daemon.notice openvpn(Puria)[5794]: TLS: Initial packet from [AF_INET]78.39.46.39:1194, sid=24203019 4bd5192f
Sun Sep 17 12:15:14 2023 daemon.notice openvpn(Puria)[5794]: VERIFY OK: depth=1, CN=Soheil
Sun Sep 17 12:15:14 2023 daemon.notice openvpn(Puria)[5794]: VERIFY KU OK
Sun Sep 17 12:15:14 2023 daemon.notice openvpn(Puria)[5794]: Validating certificate extended key usage
Sun Sep 17 12:15:14 2023 daemon.notice openvpn(Puria)[5794]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 17 12:15:14 2023 daemon.notice openvpn(Puria)[5794]: VERIFY EKU OK
Sun Sep 17 12:15:14 2023 daemon.notice openvpn(Puria)[5794]: VERIFY OK: depth=0, CN=*.Soheil
Sun Sep 17 12:15:20 2023 daemon.warn openvpn(Puria)[5794]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1499'
Sun Sep 17 12:15:20 2023 daemon.warn openvpn(Puria)[5794]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1440'
Sun Sep 17 12:15:20 2023 daemon.notice openvpn(Puria)[5794]: Control Channel: TLSv1.2, cipher TLSv1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Sun Sep 17 12:15:20 2023 daemon.notice openvpn(Puria)[5794]: [*.Soheil] Peer Connection Initiated with [AF_INET]78.39.46.39:1194
Sun Sep 17 12:15:20 2023 daemon.notice openvpn(Puria)[5794]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:15:21 2023 daemon.notice openvpn(Puria)[5794]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:15:21 2023 daemon.notice openvpn(Puria)[5794]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sun Sep 17 12:15:21 2023 daemon.notice openvpn(Puria)[5794]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:15:21 2023 daemon.notice openvpn(Puria)[5794]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:15:22 2023 daemon.notice openvpn(Puria)[5794]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:15:22 2023 daemon.notice openvpn(Puria)[5794]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:15:26 2023 daemon.notice openvpn(Puria)[5794]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sun Sep 17 12:15:31 2023 daemon.notice openvpn(Puria)[5794]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,ping 20,ping-restart 60,topology subnet,route-gateway 172.20.70.75,ifconfig 192.168.200.67 255.255.255.0'
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: Pushed option removed by filter: 'route-gateway 172.20.70.75'
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: OPTIONS IMPORT: timers and/or timeouts modified
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: OPTIONS IMPORT: --ifconfig/up options modified
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: Using peer cipher 'AES-256-CBC'
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: net_route_v4_best_gw query: dst 0.0.0.0
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan0
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: TUN/TAP device tun0 opened
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: do_ifconfig, ipv4=1, ipv6=0
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: net_iface_mtu_set: mtu 1500 for tun0
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: net_iface_up: set tun0 up
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: net_addr_v4_add: 192.168.200.67/24 dev tun0
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: /usr/libexec/openvpn-hotplug up Puria tun0 1500 1623 192.168.200.67 255.255.255.0 init
Sun Sep 17 12:15:32 2023 daemon.warn openvpn(Puria)[5794]: NOTE: unable to redirect IPv4 default gateway -- VPN gateway parameter (--route-gateway or --ifconfig) is missing
Sun Sep 17 12:15:32 2023 daemon.notice openvpn(Puria)[5794]: Initialization Sequence Completed
Sun Sep 17 12:20:08 2023 daemon.err openvpn(Puria)[5794]: event_wait : Interrupted system call (code=4)
Sun Sep 17 12:20:08 2023 daemon.notice openvpn(Puria)[5794]: TCP/UDP: Closing socket
Sun Sep 17 12:20:08 2023 daemon.notice openvpn(Puria)[5794]: Closing TUN/TAP interface
Sun Sep 17 12:20:08 2023 daemon.notice openvpn(Puria)[5794]: net_addr_v4_del: 192.168.200.67 dev tun0
Sun Sep 17 12:20:08 2023 daemon.notice openvpn(Puria)[5794]: /usr/libexec/openvpn-hotplug down Puria tun0 1500 1623 192.168.200.67 255.255.255.0 init
Sun Sep 17 12:20:08 2023 daemon.notice openvpn(Puria)[5794]: SIGTERM[hard,] received, process exiting
Sun Sep 17 12:20:11 2023 daemon.warn openvpn(Puria)[6095]: WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
Sun Sep 17 12:20:11 2023 daemon.warn openvpn(Puria)[6095]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: OpenVPN 2.5.7 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: library versions: wolfSSL 5.6.3
Sun Sep 17 12:20:11 2023 daemon.warn openvpn(Puria)[6095]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: TCP/UDP: Preserving recently used remote address: [AF_INET]87.236.213.55:1194
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: Attempting to establish TCP connection with [AF_INET]87.236.213.55:1194 [nonblock]
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: TCP connection established with [AF_INET]87.236.213.55:1194
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: TCP_CLIENT link local: (not bound)
Sun Sep 17 12:20:11 2023 daemon.notice openvpn(Puria)[6095]: TCP_CLIENT link remote: [AF_INET]87.236.213.55:1194
Sun Sep 17 12:20:12 2023 daemon.notice openvpn(Puria)[6095]: TLS: Initial packet from [AF_INET]87.236.213.55:1194, sid=ec8f4377 b9120035
Sun Sep 17 12:20:41 2023 daemon.err openvpn(Puria)[6095]: Connection reset, restarting [0]
Sun Sep 17 12:20:41 2023 daemon.notice openvpn(Puria)[6095]: TCP/UDP: Closing socket
Sun Sep 17 12:20:41 2023 daemon.notice openvpn(Puria)[6095]: SIGUSR1[soft,connection-reset] received, process restarting
Sun Sep 17 12:20:41 2023 daemon.notice openvpn(Puria)[6095]: Restart pause, 5 second(s)
Sun Sep 17 12:20:46 2023 daemon.warn openvpn(Puria)[6095]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: Re-using SSL/TLS context
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: TCP/UDP: Preserving recently used remote address: [AF_INET]78.39.46.39:1194
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: Attempting to establish TCP connection with [AF_INET]78.39.46.39:1194 [nonblock]
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: TCP connection established with [AF_INET]78.39.46.39:1194
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: TCP_CLIENT link local: (not bound)
Sun Sep 17 12:20:46 2023 daemon.notice openvpn(Puria)[6095]: TCP_CLIENT link remote: [AF_INET]78.39.46.39:1194
Sun Sep 17 12:20:47 2023 daemon.notice openvpn(Puria)[6095]: TLS: Initial packet from [AF_INET]78.39.46.39:1194, sid=2d71ad63 e9dc179a
Sun Sep 17 12:20:48 2023 daemon.notice openvpn(Puria)[6095]: VERIFY OK: depth=1, CN=Soheil
Sun Sep 17 12:20:48 2023 daemon.notice openvpn(Puria)[6095]: VERIFY KU OK
Sun Sep 17 12:20:48 2023 daemon.notice openvpn(Puria)[6095]: Validating certificate extended key usage
Sun Sep 17 12:20:48 2023 daemon.notice openvpn(Puria)[6095]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 17 12:20:48 2023 daemon.notice openvpn(Puria)[6095]: VERIFY EKU OK
Sun Sep 17 12:20:48 2023 daemon.notice openvpn(Puria)[6095]: VERIFY OK: depth=0, CN=*.Soheil
Sun Sep 17 12:20:53 2023 daemon.warn openvpn(Puria)[6095]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1499'
Sun Sep 17 12:20:53 2023 daemon.warn openvpn(Puria)[6095]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1440'
Sun Sep 17 12:20:53 2023 daemon.notice openvpn(Puria)[6095]: Control Channel: TLSv1.2, cipher TLSv1.2 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Sun Sep 17 12:20:53 2023 daemon.notice openvpn(Puria)[6095]: [*.Soheil] Peer Connection Initiated with [AF_INET]78.39.46.39:1194
Sun Sep 17 12:20:54 2023 daemon.notice openvpn(Puria)[6095]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:20:54 2023 daemon.notice openvpn(Puria)[6095]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sun Sep 17 12:20:54 2023 daemon.notice openvpn(Puria)[6095]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:20:54 2023 daemon.notice openvpn(Puria)[6095]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:20:54 2023 daemon.notice openvpn(Puria)[6095]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:20:54 2023 daemon.notice openvpn(Puria)[6095]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:20:54 2023 daemon.notice openvpn(Puria)[6095]: Key [AF_INET]78.39.46.39:1194 [0] not initialized (yet), dropping packet.
Sun Sep 17 12:21:00 2023 daemon.notice openvpn(Puria)[6095]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: SENT CONTROL [*.Soheil]: 'PUSH_REQUEST' (status=1)
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,ping 20,ping-restart 60,topology subnet,route-gateway 172.20.70.75,ifconfig 192.168.200.73 255.255.255.0'
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: Pushed option removed by filter: 'route-gateway 172.20.70.75'
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: OPTIONS IMPORT: timers and/or timeouts modified
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: OPTIONS IMPORT: --ifconfig/up options modified
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: Using peer cipher 'AES-256-CBC'
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: net_route_v4_best_gw query: dst 0.0.0.0
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan0
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: TUN/TAP device tun0 opened
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: do_ifconfig, ipv4=1, ipv6=0
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: net_iface_mtu_set: mtu 1500 for tun0
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: net_iface_up: set tun0 up
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: net_addr_v4_add: 192.168.200.73/24 dev tun0
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: /usr/libexec/openvpn-hotplug up Puria tun0 1500 1623 192.168.200.73 255.255.255.0 init
Sun Sep 17 12:21:05 2023 daemon.warn openvpn(Puria)[6095]: NOTE: unable to redirect IPv4 default gateway -- VPN gateway parameter (--route-gateway or --ifconfig) is missing
Sun Sep 17 12:21:05 2023 daemon.notice openvpn(Puria)[6095]: Initialization Sequence Completed

It looks like DPI breaks your connection. You should use obfuscation.

Thank u Guyz all i just changed Was the VpnProfile and set another DNS for WWAN
i got another ovpn profile from vpngate.com started to test them and they worked seems some Openvpn profiles not working on OpenWRT but they work in openconnect and openvpn client apps likes those i had i was testing 2 bad config file(openvpn profile) they were working on windows but not on my router its working now thank U all again

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.