OpenvVPN DCO decrypt failed: -74

Hello forum members,
I would like to ask you for help or possibly to be pointed in the right direction.
I updated OpenWRT because of OpenVPN DCO, but I am unable to get it working.
I am getting the error ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74, which I don’t know how to resolve.
I can successfully connect, but data is no longer passing through the tunnel.

If I disable DCO, everything works correctly and without errors.
Thank you all in advance for your time and help.

ubus call system board
root@RT:~# ubus call system board
{
        "kernel": "6.6.119",
        "hostname": "RT",
        "system": "ARMv7 Processor rev 5 (v7l)",
        "model": "ASUS RT-AC58U",
        "board_name": "asus,rt-ac58u",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "24.10.5",
                "revision": "r29087-d9c5716d1d",
                "target": "ipq40xx/generic",
                "description": "OpenWrt 24.10.5 r29087-d9c5716d1d",
                "builddate": "1766005702"
        }
}
/proc/cpuinfo
processor       : 0
model name      : ARMv7 Processor rev 5 (v7l)
BogoMIPS        : 96.00
Features        : half thumb fastmult vfp edsp neon vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm
CPU implementer : 0x41
CPU architecture: 7
CPU variant     : 0x0
CPU part        : 0xc07
CPU revision    : 5

processor       : 1
model name      : ARMv7 Processor rev 5 (v7l)
BogoMIPS        : 96.00
Features        : half thumb fastmult vfp edsp neon vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm
CPU implementer : 0x41
CPU architecture: 7
CPU variant     : 0x0
CPU part        : 0xc07
CPU revision    : 5

processor       : 2
model name      : ARMv7 Processor rev 5 (v7l)
BogoMIPS        : 96.00
Features        : half thumb fastmult vfp edsp neon vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm
CPU implementer : 0x41
CPU architecture: 7
CPU variant     : 0x0
CPU part        : 0xc07
CPU revision    : 5

processor       : 3
model name      : ARMv7 Processor rev 5 (v7l)
BogoMIPS        : 96.00
Features        : half thumb fastmult vfp edsp neon vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm
CPU implementer : 0x41
CPU architecture: 7
CPU variant     : 0x0
CPU part        : 0xc07
CPU revision    : 5

Hardware        : Generic DT based system
Revision        : 0000
Serial          : 0000000000000000
openvpn --version
root@RT:~# openvpn --version
OpenVPN 2.6.14 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] [DCO]
library versions: OpenSSL 3.0.19 27 Jan 2026, LZO 2.10
DCO version: N/A
Originally developed by James Yonan
Copyright (C) 2002-2024 OpenVPN Inc <sales@openvpn.net>
/etc/config/openvpn
root@RT:~# cat /etc/config/openvpn
config openvpn 'OpenVPN1Lan'
    option enabled '1'
    option mode 'server'
    option tls_server '1'
    option dev 'tun-localVPN1'
    option port '1194'
    option proto 'udp'
    option script_security '2'
    option auth_user_pass_verify '/etc/openvpn/ovpnauth.sh via-file'
    option client_connect '/etc/openvpn/client-connect.sh'
    option client_disconnect '/etc/openvpn/client-disconnect2.sh'
    option cipher 'AES-256-GCM'
    option tls_crypt_v2 '/etc/openvpn/tls-crypt-v2-server.key'
    option User 'nobody'
    option Group 'nogroup'
    option persist_key '1'
    option persist_tun '1'
    option ca '/etc/openvpn/ca.crt'
    option cert '/etc/openvpn/Server.crt'
    option key '/etc/openvpn/Server.key'
    option dh '/etc/openvpn/dh4096.pem'
    option status '/var/log/openvpn_status.log'
    option log '/var/log/openvpn.log'
    option verb '7'
#    option mute '5'
    option server '10.8.0.0 255.255.255.0'
    list push 'topology subnet'
    list push 'route-gateway dhcp'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1' # This should already match your router address and not need to be changed.
    list push 'dhcp-option WINS 192.168.1.1' # This should already match your router address and not need to be changed.
    option float '1'
    option keepalive '15 60'
    option disable_dco '0'
    option allow_compression 'no'
    option 'topology' 'subnet'
    option ifconfig_pool_persist '/etc/openvpn/ipp.txt 1'
    option client_to_client '1'
openvpn.log
root@RT:~# cat /tmp/log/openvpn.log
2026-02-22 17:52:12 us=250890 Note: --client-to-client has no effect when using data channel offload: packets are always sent to the VPN interface and then routed based on the system routing table
2026-02-22 17:52:12 us=251214 OpenVPN 2.6.14 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] [DCO]
2026-02-22 17:52:12 us=251502 library versions: OpenSSL 3.0.19 27 Jan 2026, LZO 2.10
2026-02-22 17:52:12 us=251704 DCO version: N/A
2026-02-22 17:52:12 us=252087 net_route_v4_best_gw query: dst 0.0.0.0
2026-02-22 17:52:12 us=252522 sitnl_send: checking for received messages
2026-02-22 17:52:12 us=252775 sitnl_send: rtnl: received 600 bytes
2026-02-22 17:52:12 us=253040 net_route_v4_best_gw result: via 10.242.208.1 dev wan
2026-02-22 17:52:12 us=253300 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2026-02-22 17:52:12 us=267228 Diffie-Hellman initialized with 4096 bit key
2026-02-22 17:52:12 us=286414 tls-crypt-v2 server key: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:12 us=286914 tls-crypt-v2 server key: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:12 us=287441 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload
2026-02-22 17:52:12 us=287741 TLS-Auth MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2026-02-22 17:52:12 us=289107 open_tun_dco: tun-localVPN1
2026-02-22 17:52:12 us=289484 net_iface_new: add tun-localVPN1 type ovpn-dco
2026-02-22 17:52:12 us=291637 sitnl_send: checking for received messages
2026-02-22 17:52:12 us=292176 sitnl_send: rtnl: received 36 bytes
2026-02-22 17:52:12 us=292728 ovpn_dco_register
2026-02-22 17:52:12 us=294345 DCO device tun-localVPN1 opened
2026-02-22 17:52:12 us=295000 do_ifconfig, ipv4=1, ipv6=0
2026-02-22 17:52:12 us=295616 net_iface_mtu_set: mtu 1500 for tun-localVPN1
2026-02-22 17:52:12 us=296588 sitnl_send: checking for received messages
2026-02-22 17:52:12 us=297267 sitnl_send: rtnl: received 36 bytes
2026-02-22 17:52:12 us=297890 net_iface_up: set tun-localVPN1 up
2026-02-22 17:52:12 us=298631 sitnl_send: checking for received messages
2026-02-22 17:52:12 us=299236 sitnl_send: rtnl: received 36 bytes
2026-02-22 17:52:12 us=299826 net_addr_v4_add: 10.8.0.1/24 dev tun-localVPN1
2026-02-22 17:52:12 us=300863 sitnl_send: checking for received messages
2026-02-22 17:52:12 us=301434 sitnl_send: rtnl: received 36 bytes
2026-02-22 17:52:12 us=302103 /usr/libexec/openvpn-hotplug up OpenVPN1Lan tun-localVPN1 1500 0 10.8.0.1 255.255.255.0 init
2026-02-22 17:52:12 us=395203 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2026-02-22 17:52:12 us=395622 Could not determine IPv4/IPv6 protocol. Using AF_INET
2026-02-22 17:52:12 us=396015 Socket Buffers: R=[180224->180224] S=[180224->180224]
2026-02-22 17:52:12 us=396513 UDPv4 link local (bound): [AF_INET][undef]:1194
2026-02-22 17:52:12 us=396884 UDPv4 link remote: [AF_UNSPEC]
2026-02-22 17:52:12 us=397354 MULTI: multi_init called, r=256 v=256
2026-02-22 17:52:12 us=397924 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2026-02-22 17:52:12 us=398443 ifconfig_pool_read(), in='Client,10.8.0.2,'
2026-02-22 17:52:12 us=398942 succeeded -> ifconfig_pool_set(hand=0)
2026-02-22 17:52:12 us=399989 ifconfig_pool_read(), in='Client2,10.8.0.3,'
2026-02-22 17:52:12 us=400406 succeeded -> ifconfig_pool_set(hand=1)
2026-02-22 17:52:12 us=400745 ifconfig_pool_read(), in='client4,10.8.0.4,'
2026-02-22 17:52:12 us=401162 succeeded -> ifconfig_pool_set(hand=2)
2026-02-22 17:52:12 us=401570 ifconfig_pool_read(), in='client5,10.8.0.5,'
2026-02-22 17:52:12 us=402011 succeeded -> ifconfig_pool_set(hand=3)
2026-02-22 17:52:12 us=402359 ifconfig_pool_read(), in='client6,10.8.0.6,'
2026-02-22 17:52:12 us=402691 succeeded -> ifconfig_pool_set(hand=4)
2026-02-22 17:52:12 us=403023 ifconfig_pool_read(), in='client7,10.8.0.7,'
2026-02-22 17:52:12 us=403462 succeeded -> ifconfig_pool_set(hand=5)
2026-02-22 17:52:12 us=403817 ifconfig_pool_read(), in='client8,10.8.0.8,'
2026-02-22 17:52:12 us=404212 succeeded -> ifconfig_pool_set(hand=6)
2026-02-22 17:52:12 us=404528 ifconfig_pool_read(), in='client9,10.8.0.9,'
2026-02-22 17:52:12 us=404850 succeeded -> ifconfig_pool_set(hand=7)
2026-02-22 17:52:12 us=405170 ifconfig_pool_read(), in='client10,10.8.0.10,'
2026-02-22 17:52:12 us=405584 succeeded -> ifconfig_pool_set(hand=8)
2026-02-22 17:52:12 us=405933 ifconfig_pool_read(), in='client11,10.8.0.11,'
2026-02-22 17:52:12 us=406300 succeeded -> ifconfig_pool_set(hand=9)
2026-02-22 17:52:12 us=406610 ifconfig_pool_read(), in='client12,10.8.0.12,'
2026-02-22 17:52:12 us=406938 succeeded -> ifconfig_pool_set(hand=10)
2026-02-22 17:52:12 us=407264 ifconfig_pool_read(), in='client13,10.8.0.13,'
2026-02-22 17:52:12 us=407679 succeeded -> ifconfig_pool_set(hand=11)
2026-02-22 17:52:12 us=408024 ifconfig_pool_read(), in='client14,10.8.0.14,'
2026-02-22 17:52:12 us=408386 succeeded -> ifconfig_pool_set(hand=12)
2026-02-22 17:52:12 us=408691 ifconfig_pool_read(), in='client15,10.8.0.15,'
2026-02-22 17:52:12 us=409023 succeeded -> ifconfig_pool_set(hand=13)
2026-02-22 17:52:12 us=409490 ifconfig_pool_read(), in='client16,10.8.0.16,'
2026-02-22 17:52:12 us=409869 succeeded -> ifconfig_pool_set(hand=14)
2026-02-22 17:52:12 us=410140 ifconfig_pool_read(), in='client17,10.8.0.17,'
2026-02-22 17:52:12 us=410415 succeeded -> ifconfig_pool_set(hand=15)
2026-02-22 17:52:12 us=410757 ifconfig_pool_read(), in='client18,10.8.0.18,'
2026-02-22 17:52:12 us=411204 succeeded -> ifconfig_pool_set(hand=16)
2026-02-22 17:52:12 us=411549 ifconfig_pool_read(), in='client19,10.8.0.19,'
2026-02-22 17:52:12 us=411909 succeeded -> ifconfig_pool_set(hand=17)
2026-02-22 17:52:12 us=412233 IFCONFIG POOL LIST
2026-02-22 17:52:12 us=412553 PaullShull,10.8.0.2,
2026-02-22 17:52:12 us=412881 Android,10.8.0.3,
2026-02-22 17:52:12 us=413294 client4,10.8.0.4,
2026-02-22 17:52:12 us=413656 client5,10.8.0.5,
2026-02-22 17:52:12 us=414006 client6,10.8.0.6,
2026-02-22 17:52:12 us=414323 client7,10.8.0.7,
2026-02-22 17:52:12 us=414634 client8,10.8.0.8,
2026-02-22 17:52:12 us=414955 client9,10.8.0.9,
2026-02-22 17:52:12 us=415360 client10,10.8.0.10,
2026-02-22 17:52:12 us=415717 client11,10.8.0.11,
2026-02-22 17:52:12 us=416071 client12,10.8.0.12,
2026-02-22 17:52:12 us=416392 client13,10.8.0.13,
2026-02-22 17:52:12 us=416699 client14,10.8.0.14,
2026-02-22 17:52:12 us=417021 client15,10.8.0.15,
2026-02-22 17:52:12 us=417438 client16,10.8.0.16,
2026-02-22 17:52:12 us=417802 client17,10.8.0.17,
2026-02-22 17:52:12 us=418148 client18,10.8.0.18,
2026-02-22 17:52:12 us=418453 client19,10.8.0.19,
2026-02-22 17:52:12 us=419023 Initialization Sequence Completed
2026-02-22 17:52:22 us=429709 dco_get_peer_stats_multi
2026-02-22 17:52:55 us=80389 Control Channel: using tls-crypt-v2 key
2026-02-22 17:52:55 us=81166 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=81651 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=81973 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=82311 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=82774 Reset packet from client, sending HMAC based reset challenge
2026-02-22 17:52:55 us=83163 Connection Attempt UDPv4 WRITE [72] to [AF_INET]78.80.104.162:6199:  DATA len=72
2026-02-22 17:52:55 us=129630 Connection Attempt Control Channel: using tls-crypt-v2 key
2026-02-22 17:52:55 us=130323 Connection Attempt Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=130737 Connection Attempt Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=131042 Connection Attempt Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=131371 Connection Attempt Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=131857 Connection Attempt Valid packet (P_CONTROL_WKC_V1) with HMAC challenge from peer ([AF_INET]78.80.104.162:6199), accepting new connection.
2026-02-22 17:52:55 us=132109 Connection Attempt MULTI: multi_create_instance called
2026-02-22 17:52:55 us=132504 78.80.104.162:6199 Re-using SSL/TLS context
2026-02-22 17:52:55 us=133007 78.80.104.162:6199 tls-crypt-v2 server key: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=133409 78.80.104.162:6199 tls-crypt-v2 server key: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=133790 78.80.104.162:6199 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload
2026-02-22 17:52:55 us=134972 78.80.104.162:6199 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2026-02-22 17:52:55 us=135337 78.80.104.162:6199 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2026-02-22 17:52:55 us=135966 78.80.104.162:6199 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
2026-02-22 17:52:55 us=136206 78.80.104.162:6199 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
2026-02-22 17:52:55 us=136707 78.80.104.162:6199 UDPv4 READ [651] from [AF_INET]78.80.104.162:6199: P_CONTROL_WKC_V1 kid=0 pid=[ #251658242 ]
2026-02-22 17:52:55 us=136988 78.80.104.162:6199 Control Channel: using tls-crypt-v2 key
2026-02-22 17:52:55 us=137486 78.80.104.162:6199 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=137858 78.80.104.162:6199 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=138149 78.80.104.162:6199 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=138476 78.80.104.162:6199 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=391594 78.80.104.162:6199 UDPv4 WRITE [1206] to [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #2 ]
2026-02-22 17:52:55 us=392410 78.80.104.162:6199 UDPv4 WRITE [1206] to [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #3 ]
2026-02-22 17:52:55 us=393121 78.80.104.162:6199 UDPv4 WRITE [1206] to [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #4 ]
2026-02-22 17:52:55 us=393729 78.80.104.162:6199 UDPv4 WRITE [345] to [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #5 ]
2026-02-22 17:52:55 us=428859 78.80.104.162:6199 UDPv4 READ [66] from [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #251658243 ]
2026-02-22 17:52:55 us=429867 78.80.104.162:6199 UDPv4 READ [70] from [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #251658244 ]
2026-02-22 17:52:55 us=452751 78.80.104.162:6199 UDPv4 READ [74] from [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #251658245 ]
2026-02-22 17:52:55 us=510296 78.80.104.162:6199 UDPv4 READ [1328] from [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #251658246 ]
2026-02-22 17:52:55 us=511541 78.80.104.162:6199 UDPv4 WRITE [66] to [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #6 ]
2026-02-22 17:52:55 us=512256 78.80.104.162:6199 UDPv4 READ [1328] from [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #251658247 ]
2026-02-22 17:52:55 us=513249 78.80.104.162:6199 UDPv4 WRITE [70] to [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #7 ]
2026-02-22 17:52:55 us=513910 78.80.104.162:6199 UDPv4 READ [1328] from [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #251658248 ]
2026-02-22 17:52:55 us=523423 78.80.104.162:6199 VERIFY OK: depth=1, OU=PaullShull Certificate Authority, CN=OpenVPN_CA
2026-02-22 17:52:55 us=527862 78.80.104.162:6199 VERIFY OK: depth=0, CN=Android, emailAddress=email@emaill.com
2026-02-22 17:52:55 us=534582 78.80.104.162:6199 UDPv4 WRITE [236] to [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #8 ]
2026-02-22 17:52:55 us=535445 78.80.104.162:6199 UDPv4 READ [259] from [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #251658249 ]
2026-02-22 17:52:55 us=536157 78.80.104.162:6199 peer info: IV_VER=3.11.1
2026-02-22 17:52:55 us=536527 78.80.104.162:6199 peer info: IV_PLAT=ios
2026-02-22 17:52:55 us=536793 78.80.104.162:6199 peer info: IV_NCP=2
2026-02-22 17:52:55 us=537022 78.80.104.162:6199 peer info: IV_TCPNL=1
2026-02-22 17:52:55 us=537238 78.80.104.162:6199 peer info: IV_PROTO=8094
2026-02-22 17:52:55 us=537452 78.80.104.162:6199 peer info: IV_MTU=1600
2026-02-22 17:52:55 us=537673 78.80.104.162:6199 peer info: IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
2026-02-22 17:52:55 us=537879 78.80.104.162:6199 peer info: IV_SSO=webauth,crtext
2026-02-22 17:52:55 us=627293 78.80.104.162:6199 TLS: Username/Password authentication succeeded for username 'Android'
2026-02-22 17:52:55 us=627752 78.80.104.162:6199 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2026-02-22 17:52:55 us=629630 78.80.104.162:6199 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2026-02-22 17:52:55 us=630720 78.80.104.162:6199 TLS: tls_multi_process: initial untrusted session promoted to trusted
2026-02-22 17:52:55 us=631210 78.80.104.162:6199 UDPv4 WRITE [306] to [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #9 ]
2026-02-22 17:52:55 us=632004 78.80.104.162:6199 UDPv4 READ [74] from [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #251658250 ]
2026-02-22 17:52:55 us=672837 78.80.104.162:6199 UDPv4 READ [74] from [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #251658251 ]
2026-02-22 17:52:55 us=673500 78.80.104.162:6199 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
2026-02-22 17:52:55 us=673899 78.80.104.162:6199 [Android] Peer Connection Initiated with [AF_INET]78.80.104.162:6199
2026-02-22 17:52:55 us=674674 Android/78.80.104.162:6199 peer-id=0 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2026-02-22 17:52:55 us=675388 Android/78.80.104.162:6199 peer-id=0 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd//Android
2026-02-22 17:52:55 us=687192 Android/78.80.104.162:6199 peer-id=0 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_270bce2b7c91f8a6.tmp
2026-02-22 17:52:55 us=688031 Android/78.80.104.162:6199 peer-id=0 MULTI: Learn: 10.8.0.3 -> Android/78.80.104.162:6199 peer-id=0
2026-02-22 17:52:55 us=688474 Android/78.80.104.162:6199 peer-id=0 MULTI: primary virtual IP for Android/78.80.104.162:6199 peer-id=0: 10.8.0.3
2026-02-22 17:52:55 us=688890 Android/78.80.104.162:6199 peer-id=0 dco_new_peer: peer-id 0, fd 6, remote addr: [AF_INET]78.80.104.162:6199
2026-02-22 17:52:55 us=689698 Android/78.80.104.162:6199 peer-id=0 dco_set_peer: peer-id 0, keepalive 15/120, mss 0
2026-02-22 17:52:55 us=690601 Android/78.80.104.162:6199 peer-id=0 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2026-02-22 17:52:55 us=691428 Android/78.80.104.162:6199 peer-id=0 Outgoing dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=691890 Android/78.80.104.162:6199 peer-id=0 Outgoing dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=692315 Android/78.80.104.162:6199 peer-id=0 Incoming dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
2026-02-22 17:52:55 us=692750 Android/78.80.104.162:6199 peer-id=0 Incoming dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2026-02-22 17:52:55 us=693399 Android/78.80.104.162:6199 peer-id=0 dco_install_key: peer_id=0 keyid=0, currently 0 keys installed
2026-02-22 17:52:55 us=693722 Android/78.80.104.162:6199 peer-id=0 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2026-02-22 17:52:56 us=439267 Android/78.80.104.162:6199 peer-id=0 SENT CONTROL [Android]: 'PUSH_REPLY,topology subnet,route-gateway dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,dhcp-option WINS 192.168.1.1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,redirect-gateway def1,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2026-02-22 17:52:56 us=440878 Android/78.80.104.162:6199 peer-id=0 UDPv4 READ [113] from [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #251658252 ]
2026-02-22 17:52:56 us=441523 Android/78.80.104.162:6199 peer-id=0 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2026-02-22 17:52:56 us=441881 Android/78.80.104.162:6199 peer-id=0 Timers: ping 15, ping-restart 120
2026-02-22 17:52:56 us=442176 Android/78.80.104.162:6199 peer-id=0 Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
2026-02-22 17:52:56 us=443210 Android/78.80.104.162:6199 peer-id=0 PUSH: Received control message: 'PUSH_REQUEST'
2026-02-22 17:52:56 us=443707 Android/78.80.104.162:6199 peer-id=0 UDPv4 WRITE [439] to [AF_INET]78.80.104.162:6199: P_CONTROL_V1 kid=0 pid=[ #10 ]
udhcpc: started, v1.36.1
udhcpc: broadcasting discover
2026-02-22 17:52:56 us=561761 Android/78.80.104.162:6199 peer-id=0 UDPv4 READ [74] from [AF_INET]78.80.104.162:6199: P_ACK_V1 kid=0 pid=[ #251658253 ]
udhcpc: no lease, failing
2026-02-22 17:53:22 us=571976 dco_get_peer_stats_multi
2026-02-22 17:53:22 us=572802 dco_parse_peer_multi: parsing message...
2026-02-22 17:53:22 us=573113 dco_update_peer_stat / dco_read_bytes: 7032
2026-02-22 17:53:22 us=573347 dco_update_peer_stat / dco_write_bytes: 40
2026-02-22 17:53:22 us=573561 dco_update_peer_stat / tun_read_bytes: 0
2026-02-22 17:53:22 us=573764 dco_update_peer_stat / tun_write_bytes: 16
logread | grep -i kern.err
root@RT:~# logread | grep -i kern.err
Sun Feb 22 13:31:24 2026 kern.err kernel: [    1.137046] OF: Bad cell count for /soc/spi@78b5000/spi-nand@1/partitions
Sun Feb 22 13:31:24 2026 kern.err kernel: [    1.143355] OF: Bad cell count for /soc/spi@78b5000/spi-nand@1/partitions
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.371407] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.371471] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.379224] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.382328] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.411527] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.411583] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.591699] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.591773] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.599656] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:01 2026 kern.err kernel: [15682.602621] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:06 2026 kern.err kernel: [15687.671635] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:06 2026 kern.err kernel: [15687.675332] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:06 2026 kern.err kernel: [15687.680467] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:06 2026 kern.err kernel: [15687.687314] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:06 2026 kern.err kernel: [15688.081603] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:06 2026 kern.err kernel: [15688.081666] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:07 2026 kern.err kernel: [15688.551284] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:07 2026 kern.err kernel: [15688.551346] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:07 2026 kern.err kernel: [15688.559892] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:07 2026 kern.err kernel: [15688.562203] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:13 2026 kern.err kernel: [15695.092024] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:13 2026 kern.err kernel: [15695.095720] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.901097] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.901159] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.909939] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.912024] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.917257] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.924131] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.929154] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:15 2026 kern.err kernel: [15696.936146] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:21 2026 kern.err kernel: [15703.091411] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:21 2026 kern.err kernel: [15703.095106] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.441516] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.441580] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.911698] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.911761] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.919799] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.922617] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.927606] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.934748] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.939743] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:31 2026 kern.err kernel: [15712.946748] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:37 2026 kern.err kernel: [15718.691560] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:37 2026 kern.err kernel: [15718.695257] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:37 2026 kern.err kernel: [15719.099755] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:37 2026 kern.err kernel: [15719.099819] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
Sun Feb 22 17:53:45 2026 kern.err kernel: [15726.901542] ovpn_aead_decrypt: decrypt failed: -74
Sun Feb 22 17:53:45 2026 kern.err kernel: [15726.901604] ovpn_decrypt_one: error during decryption for peer 0, key-id 0: -74
ip link show tun-localVPN1
root@RT:~# ip link show tun-localVPN1
11: tun-localVPN1: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN qlen 1000
    link/[65534]

see here : https://github.com/openwrt/openwrt/issues/21953#issuecomment-3916836960

ie wait for mext dco update

1 Like

Consider using WireGuard it is three times faster then OpenVPN and easier to install and it works :slight_smile:

2 Likes

Thank you all !

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.