Here is the last 100 lines
2026-01-20 11:37:35 Could not determine IPv4/IPv6 protocol. Using AF_INET
2026-01-20 11:37:35 Socket Buffers: R=[180224->180224] S=[180224->180224]
2026-01-20 11:37:35 UDPv4 link local (bound): [AF_INET][undef]:1194
2026-01-20 11:37:35 UDPv4 link remote: [AF_UNSPEC]
2026-01-20 11:37:35 UID set to nobody
2026-01-20 11:37:35 GID set to nogroup
2026-01-20 11:37:35 Capabilities retained: CAP_NET_ADMIN
2026-01-20 11:37:35 MULTI: multi_init called, r=256 v=256
2026-01-20 11:37:35 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2026-01-20 11:37:35 Initialization Sequence Completed
2026-01-20 11:39:35 Control Channel: using tls-crypt-v2 key
2026-01-20 11:39:35 Connection Attempt Control Channel: using tls-crypt-v2 key
2026-01-20 11:39:35 NUMBERSNDOTS:27965 Control Channel: using tls-crypt-v2 key
2026-01-20 11:39:35 NUMBERSNDOTS:27965 VERIFY OK: depth=1, CN=Easy-RSA CA
2026-01-20 11:39:35 NUMBERSNDOTS:27965 VERIFY OK: depth=0, CN=reacher
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_VER=3.11.1
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_PLAT=android
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_NCP=2
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_TCPNL=1
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_PROTO=8094
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_MTU=1600
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_AUTO_SESS=1
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_GUI_VER=net.openvpn.connect.android_3.7.1-10568
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_SSO=webauth,crtext
2026-01-20 11:39:35 NUMBERSNDOTS:27965 peer info: IV_BS64DL=1
2026-01-20 11:39:35 NUMBERSNDOTS:27965 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2026-01-20 11:39:35 NUMBERSNDOTS:27965 TLS: tls_multi_process: initial untrusted session promoted to trusted
2026-01-20 11:39:35 NUMBERSNDOTS:27965 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2026-01-20 11:39:35 NUMBERSNDOTS:27965 [reacher] Peer Connection Initiated with [AF_INET]NUMBERSNDOTS:27965
2026-01-20 11:39:35 reacher/NUMBERSNDOTS:27965 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2026-01-20 11:39:35 reacher/NUMBERSNDOTS:27965 MULTI: Learn: 10.8.0.2 -> reacher/NUMBERSNDOTS:27965
2026-01-20 11:39:35 reacher/NUMBERSNDOTS:27965 MULTI: primary virtual IP for reacher/NUMBERSNDOTS:27965: 10.8.0.2
2026-01-20 11:39:35 reacher/NUMBERSNDOTS:27965 SENT CONTROL [reacher]: 'PUSH_REPLY,persist-tun,persist-key,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2026-01-20 11:39:35 reacher/NUMBERSNDOTS:27965 PUSH: Received control message: 'PUSH_REQUEST'
2026-01-20 11:39:36 reacher/NUMBERSNDOTS:27965 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2026-01-20 11:39:36 reacher/NUMBERSNDOTS:27965 Timers: ping 10, ping-restart 120
2026-01-20 11:39:36 reacher/NUMBERSNDOTS:27965 Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
2026-01-20 11:44:01 reacher/NUMBERSNDOTS:27965 Delayed exit in 5 seconds
2026-01-20 11:44:06 Control Channel: using tls-crypt-v2 key
2026-01-20 11:44:06 Connection Attempt Control Channel: using tls-crypt-v2 key
2026-01-20 11:44:06 NUMBERSNDOTS:44340 Control Channel: using tls-crypt-v2 key
2026-01-20 11:44:06 reacher/NUMBERSNDOTS:27965 SIGTERM[soft,delayed-exit] received, client-instance exiting
2026-01-20 11:44:07 NUMBERSNDOTS:44340 VERIFY OK: depth=1, CN=Easy-RSA CA
2026-01-20 11:44:07 NUMBERSNDOTS:44340 VERIFY OK: depth=0, CN=reacher
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_VER=3.11.1
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_PLAT=android
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_NCP=2
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_TCPNL=1
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_PROTO=8094
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_MTU=1600
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_AUTO_SESS=1
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_GUI_VER=net.openvpn.connect.android_3.7.1-10568
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_SSO=webauth,crtext
2026-01-20 11:44:07 NUMBERSNDOTS:44340 peer info: IV_BS64DL=1
2026-01-20 11:44:07 NUMBERSNDOTS:44340 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2026-01-20 11:44:07 NUMBERSNDOTS:44340 TLS: tls_multi_process: initial untrusted session promoted to trusted
2026-01-20 11:44:07 NUMBERSNDOTS:44340 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2026-01-20 11:44:07 NUMBERSNDOTS:44340 [reacher] Peer Connection Initiated with [AF_INET]NUMBERSNDOTS:44340
2026-01-20 11:44:07 reacher/NUMBERSNDOTS:44340 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2026-01-20 11:44:07 reacher/NUMBERSNDOTS:44340 MULTI: Learn: 10.8.0.2 -> reacher/NUMBERSNDOTS:44340
2026-01-20 11:44:07 reacher/NUMBERSNDOTS:44340 MULTI: primary virtual IP for reacher/NUMBERSNDOTS:44340: 10.8.0.2
2026-01-20 11:44:07 reacher/NUMBERSNDOTS:44340 SENT CONTROL [reacher]: 'PUSH_REPLY,persist-tun,persist-key,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2026-01-20 11:44:07 reacher/NUMBERSNDOTS:44340 PUSH: Received control message: 'PUSH_REQUEST'
2026-01-20 11:44:08 reacher/NUMBERSNDOTS:44340 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2026-01-20 11:44:08 reacher/NUMBERSNDOTS:44340 Timers: ping 10, ping-restart 120
2026-01-20 11:44:08 reacher/NUMBERSNDOTS:44340 Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
2026-01-20 11:44:29 reacher/NUMBERSNDOTS:44340 Delayed exit in 5 seconds
2026-01-20 11:44:31 Control Channel: using tls-crypt-v2 key
2026-01-20 11:44:32 Connection Attempt Control Channel: using tls-crypt-v2 key
2026-01-20 11:44:32 NUMBERSNDOTS:3871 Control Channel: using tls-crypt-v2 key
2026-01-20 11:44:32 NUMBERSNDOTS:3871 VERIFY OK: depth=1, CN=Easy-RSA CA
2026-01-20 11:44:32 NUMBERSNDOTS:3871 VERIFY OK: depth=0, CN=reacher
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_VER=3.11.1
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_PLAT=android
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_NCP=2
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_TCPNL=1
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_PROTO=8094
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_MTU=1600
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_AUTO_SESS=1
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_GUI_VER=net.openvpn.connect.android_3.7.1-10568
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_SSO=webauth,crtext
2026-01-20 11:44:32 NUMBERSNDOTS:3871 peer info: IV_BS64DL=1
2026-01-20 11:44:32 NUMBERSNDOTS:3871 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2026-01-20 11:44:32 NUMBERSNDOTS:3871 TLS: tls_multi_process: initial untrusted session promoted to trusted
2026-01-20 11:44:32 NUMBERSNDOTS:3871 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2026-01-20 11:44:32 NUMBERSNDOTS:3871 [reacher] Peer Connection Initiated with [AF_INET]NUMBERSNDOTS:3871
2026-01-20 11:44:32 MULTI: new connection by client 'reacher' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2026-01-20 11:44:32 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2026-01-20 11:44:32 MULTI: Learn: 10.8.0.2 -> reacher/NUMBERSNDOTS:3871
2026-01-20 11:44:32 MULTI: primary virtual IP for reacher/NUMBERSNDOTS:3871: 10.8.0.2
2026-01-20 11:44:32 SENT CONTROL [reacher]: 'PUSH_REPLY,persist-tun,persist-key,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2026-01-20 11:44:32 reacher/NUMBERSNDOTS:3871 PUSH: Received control message: 'PUSH_REQUEST'
2026-01-20 11:44:33 reacher/NUMBERSNDOTS:3871 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2026-01-20 11:44:33 reacher/NUMBERSNDOTS:3871 Timers: ping 10, ping-restart 120
2026-01-20 11:44:33 reacher/NUMBERSNDOTS:3871 Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
2026-01-20 12:00:33 reacher/NUMBERSNDOTS:3871 Delayed exit in 5 seconds
2026-01-20 12:00:38 reacher/NUMBERSNDOTS:3871 SIGTERM[soft,delayed-exit] received, client-instance exiting
Anyhow thanks everyone for chiming in. I'll call this and look into wireguard as a replacement.