Just check the readme, re-enable the STA on the wireless stations tab (see screenshot, esp. the On/Off button) and finally raise the "Connection Limit" on the Additional Settings tab ... to 5-10.
Anyone realized autologin script for Wifi4EU service?
I had a chance to test my RP-WD009 travel router with Travelmate on a recent cruise. In airports, a hotel, and the cruise ship, I was not able to manually sign in from my tablet going through the travel router - I would end up getting an error that a required webpage could not be resolved. I could directly connect to the upstream access point with my tablet, resolve the hostname, add the IP address to Network-> DHCP & DNS / Hostnames, and then complete the sign in via the travel router.
I noticed that all of the webpages resolved to private addresses - I discovered that disabling Rebind protection in Network -> DHCP & DNS was a general solution to my issues. Although this is not a Travelmate issue, it is something that Travelmate users are likely to experience.
Hi @dibdot,
- Linux host 6.1.82 #0 SMP Sat Mar 30 20:59:24 2024 armv7l GNU/Linux
- travelmate_version : 2.1.2-r6
I have tried travelmate on a few different wireless routers whose radios are capable of operating both STA and AP modes on the same radio. On some routers, I have noticed that travelmate may never be able to bring up a configured wireless uplink (STA/client) if an AP is also configured and ENABLED on the same radio (using the same channel as the STA mode). The same problem is observed if I disable travelmate and just try to bring up the STA/client uplink while the AP is also enabled on the same radio. Restarting the radio does not help. However, if I temporarily disable the AP on the radio, wait for the STA/client uplink (on the same radio) to be successful (aka getting an IP address) and then re-enable the AP, then I get both STA/client uplink and AP working successfully. Both the mainline and -CT firmware/drivers exhibit the same issue.
Could you enhance Travelmate's logic to check if an AP is currently configured and enabled on the same radio as a STA/client uplink? If so, Travelmate should temporarily disable the AP when restarting the radio, wait for the STA/uplink to obtain an IP address, and then automatically re-enable the AP.
Debug log
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: , uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_jsnup ::: section: -, status: running (not connected), sta_iface: -, sta_radio: -, sta_essid: -, sta_bssid: -, ntp: 1, vpn: 0/0, mail: 0/0
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: initial, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_main-1 ::: status: false, proactive: 1
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: default_radio1, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: , section: default_radio1, active_sta: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: trm_uplink3, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: 2024.04.04-19:24:03, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: 2024.04.04-19:29:23, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: 0, section: trm_uplink3, active_sta: -, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: wifinet2, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: 2024.04.04-19:24:03, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: 2024.04.04-19:29:23, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: 0, section: wifinet2, active_sta: -, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: 2024.03.31-12:20:30, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: 2024.04.01-13:42:52, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: 1, section: trm_uplink4, active_sta: -, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: , uplink_config: @uplink[1]
Thu Apr 4 19:32:22 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 5
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: dev, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_main-3 ::: radio_list: radio0 radio1, sta_list: trm_uplink4-radio1
Thu Apr 4 19:32:28 2024 user.info trm-2.1.2-r6[13368]: no enabled station on radio 'radio0'
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: get, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_main-5 ::: sta_radio: radio1, sta_essid: "myssid-2.4ghz", sta_bssid: -
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_main-6 ::: radio: radio1, scan_device: phy1-ap0, scan_cnt: 46
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_main-7 ::: radio(sta/scan): radio1/radio1, essid(sta/scan): "myssid-2.4ghz"/"myssid-2.4ghz", bssid(sta/scan): /10:DA:43:14:9B:58, quality(min/scan): 35/100, open: -
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: macaddr, result: -, uplink_config: @uplink[1]
Thu Apr 4 19:32:32 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: set, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:32:32 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:32:32 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]
Thu Apr 4 19:32:56 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 23
Thu Apr 4 19:33:28 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: sta, name: phy1-sta0, status: , enabled: 1, connection: -, wait: 31, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:33:29 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:33:50 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 20
Thu Apr 4 19:33:50 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: rev, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:33:50 2024 user.debug trm-2.1.2-r6[13368]: f_jsnup ::: section: -, status: running (not connected), sta_iface: -, sta_radio: -, sta_essid: -, sta_bssid: -, ntp: 1, vpn: 0/0, mail: 0/0
Thu Apr 4 19:33:50 2024 user.info trm-2.1.2-r6[13368]: can't connect to uplink 'radio1/myssid-2.4ghz/-' (1/3)
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: macaddr, result: -, uplink_config: @uplink[1]
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: set, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]
Thu Apr 4 19:34:22 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 23
Thu Apr 4 19:34:54 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: sta, name: phy1-sta0, status: , enabled: 1, connection: -, wait: 31, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:34:54 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:35:12 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 17
Thu Apr 4 19:35:12 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: rev, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:35:12 2024 user.debug trm-2.1.2-r6[13368]: f_jsnup ::: section: -, status: running (not connected), sta_iface: -, sta_radio: -, sta_essid: -, sta_bssid: -, ntp: 1, vpn: 0/0, mail: 0/0
Thu Apr 4 19:35:12 2024 user.info trm-2.1.2-r6[13368]: can't connect to uplink 'radio1/myssid-2.4ghz/-' (2/3)
Thu Apr 4 19:35:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: macaddr, result: -, uplink_config: @uplink[1]
Thu Apr 4 19:35:18 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: set, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:35:18 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:35:18 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]myssid
Thank you very much for your awesome banip and travelmate. You're truly a shell script wizard!
@vochong, was this on the 5GHz range? I ran into similar issues when I was initially installing/testing OpenWRT on a travel router. If a 5GHz AP was configured and enabled, scans for 5GHz uplinks would not return anything using both Travelmate and OpenWRT. I found a few posts that recommended deleting/disabling the AP. I had planned to configure Travelmate to use 5GHz uplinks and 2.4GHz downlinks for this reason. Unfortunately, I was on a cruise ship with erratic 5GHz service and had to switch to 2.4GHz uplinks. I enabled a 5GHz AP to improve throughput and expected issues, but I had no problem switching between STAs or scanning for 5GHz uplinks. If I can recreate the issue, I will try o collect logs and open an OpenWRT thread.
Hi all, hi Dirk @dibdot .
I think I found a bug in travelmate. Some time ago I prepared my travel router for a family vacation in the USA. I have set up as well 1 wireguard VPN as 1 openvpn VPN. Default is wireguard, openvpn is intended as fallback, in case UDP traffic is blocked. That setup works very well. I have used my own openvpn server to save money. Now I tried to add an second openvpn service with a paid provider. In case UDP is blocked, chances are high that only TCP ports 80 and 443 are allowed as well. I just dont want to expose my own home network with port 443, so in this case I could switch to the second openvpn configuration.
The setup with 2 different openvpn configurations seem to confuse travelmate. Only one configuration is enabled, the other one is disabled (my_client is enabled, mullvad_client is disabled). Here is my /etc/config/openvpn
option enabled '0'
option config '/etc/openvpn/my-vpn.conf'
config openvpn 'sample_server'
option enabled '0'
option port '1194'
option proto 'udp'
option dev 'tun'
option ca '/etc/openvpn/ca.crt'
option cert '/etc/openvpn/server.crt'
option key '/etc/openvpn/server.key'
option dh '/etc/openvpn/dh2048.pem'
option server '10.8.0.0 255.255.255.0'
option ifconfig_pool_persist '/tmp/ipp.txt'
option keepalive '10 120'
option persist_key '1'
option persist_tun '1'
option user 'nobody'
option status '/tmp/openvpn-status.log'
option verb '3'
config openvpn 'sample_client'
option enabled '0'
option client '1'
option dev 'tun'
option proto 'udp'
list remote 'my_server_1 1194'
option resolv_retry 'infinite'
option nobind '1'
option persist_key '1'
option persist_tun '1'
option user 'nobody'
option ca '/etc/openvpn/ca.crt'
option cert '/etc/openvpn/client.crt'
option key '/etc/openvpn/client.key'
option verb '3'
config openvpn 'my_client'
option config '/etc/openvpn/my_client.ovpn'
option enabled '1'
config openvpn 'mullvad_client'
option config '/etc/openvpn/mullvad_client.ovpn'
option enabled '0'
Travelmate will try to run the disabled one and I have no connection, but travelmate seems to be ok with that. It shows no error in the status page:
You can see this in the system log:
Wed Apr 3 00:00:11 2024 user.debug trm-2.1.2-6[2688]: f_vpn ::: vpn: 1, enabled: 1, action: enable_keep, vpn_service: openvpn, vpn_iface: ovpn, vpn_instance: mullvad_client, vpn_infolist: wg ovpn&&mullvad_client, result: , rc: 0
system log
Tue Apr 2 23:58:57 2024 user.debug trm-2.1.2-6[2688]: f_getgw ::: wan4_gw: 192.168.2.1, wan6_gw: -, result: true
Tue Apr 2 23:59:04 2024 daemon.notice netifd: Interface 'trm_wwan6' is now up
Tue Apr 2 23:59:05 2024 user.notice firewall: Reloading firewall due to ifup of trm_wwan6 (phy0-sta0)
Tue Apr 2 23:59:33 2024 user.info trm-ntp [5257]: get ntp time sync
Tue Apr 2 23:59:49 2024 daemon.notice openvpn(my_client)[1869]: [server] Inactivity timeout (--ping-restart), restarting
Tue Apr 2 23:59:49 2024 daemon.notice openvpn(my_client)[1869]: TCP/UDP: Closing socket
Tue Apr 2 23:59:49 2024 daemon.notice openvpn(my_client)[1869]: SIGUSR1[soft,ping-restart] received, process restarting
Tue Apr 2 23:59:49 2024 daemon.notice openvpn(my_client)[1869]: Restart pause, 5 second(s)
Tue Apr 2 23:59:54 2024 daemon.warn openvpn(my_client)[1869]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Re-using SSL/TLS context
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Control Channel MTU parms [ L:1623 D:1154 EF:96 EB:0 ET:0 EL:3 ]
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1536,tun-mtu 1500,proto TCPv4_CLIENT,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,key-method 2,tls-client'
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1536,tun-mtu 1500,proto TCPv4_SERVER,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,key-method 2,tls-server'
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: TCP/UDP: Preserving recently used remote address: [AF_INET]123.456.789.123:443
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: Attempting to establish TCP connection with [AF_INET]123.456.789.123:443 [nonblock]
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: TCP connection established with [AF_INET]123.456.789.123:443
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: TCP_CLIENT link local: (not bound)
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: TCP_CLIENT link remote: [AF_INET]123.456.789.123:443
Tue Apr 2 23:59:54 2024 daemon.notice openvpn(my_client)[1869]: TLS: Initial packet from [AF_INET]123.456.789.123:443, sid=b6f21ae9 3fb79193
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: VERIFY OK: depth=1, CN=Easy-RSA CA
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: VERIFY KU OK
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: Validating certificate extended key usage
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: VERIFY EKU OK
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: VERIFY OK: depth=0, CN=server
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: [server] Peer Connection Initiated with [AF_INET]123.456.789.123:443
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: PUSH: Received control message: 'PUSH_REPLY,route-ipv6 ::/0,dhcp-option DNS 192.168.224.1,dhcp-option DNS ddaa:0:0:aab0::1,dhcp-option DOMAIN lan,redirect-gateway def1,persist-tun,persist-key,tun-ipv6,route-gateway 192.168.224.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 ddaa:0:0:aab0::1002/64 ddaa:0:0:aab0::2,ifconfig 192.168.224.3 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305'
Tue Apr 2 23:59:55 2024 daemon.err openvpn(my_client)[1869]: Options error: option 'route-ipv6' cannot be used in this context ([PUSH-OPTIONS])
Tue Apr 2 23:59:55 2024 daemon.err openvpn(my_client)[1869]: Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
Tue Apr 2 23:59:55 2024 daemon.err openvpn(my_client)[1869]: Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
Tue Apr 2 23:59:55 2024 daemon.err openvpn(my_client)[1869]: Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: Pushed option removed by filter: 'redirect-gateway def1'
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: OPTIONS IMPORT: timers and/or timeouts modified
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: OPTIONS IMPORT: --persist options modified
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: OPTIONS IMPORT: --ifconfig/up options modified
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: OPTIONS IMPORT: route-related options modified
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: OPTIONS IMPORT: peer-id set
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: OPTIONS IMPORT: adjusting link_mtu to 1626
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: OPTIONS IMPORT: data channel crypto options modified
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: Outgoing Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: Incoming Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: Preserving previous TUN/TAP instance: tun0
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: /usr/libexec/openvpn-hotplug route-pre-down my_client tun0 1500 1626 192.168.224.2 255.255.255.0 init
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: Closing TUN/TAP interface
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: net_addr_v4_del: 192.168.224.2 dev tun0
Tue Apr 2 23:59:55 2024 daemon.warn openvpn(my_client)[1869]: sitnl_send: rtnl: generic error (-1): Operation not permitted
Tue Apr 2 23:59:55 2024 daemon.warn openvpn(my_client)[1869]: Linux can't del IP from iface tun0
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: net_addr_v6_del: ddaa:0:0:aab0::1001/64 dev tun0
Tue Apr 2 23:59:55 2024 daemon.warn openvpn(my_client)[1869]: sitnl_send: rtnl: generic error (-1): Operation not permitted
Tue Apr 2 23:59:55 2024 daemon.warn openvpn(my_client)[1869]: Linux can't del IPv6 from iface tun0
Tue Apr 2 23:59:55 2024 daemon.notice netifd: Network device 'tun0' link is down
Tue Apr 2 23:59:55 2024 daemon.notice netifd: Interface 'ovpn' has link connectivity loss
Tue Apr 2 23:59:55 2024 daemon.notice openvpn(my_client)[1869]: /usr/libexec/openvpn-hotplug down my_client tun0 1500 1626 192.168.224.2 255.255.255.0 init
Tue Apr 2 23:59:56 2024 daemon.err openvpn(my_client)[1869]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: Permission denied (errno=13)
Tue Apr 2 23:59:56 2024 daemon.notice openvpn(my_client)[1869]: Exiting due to fatal error
Tue Apr 2 23:59:58 2024 user.debug trm-2.1.2-6[2688]: f_setdev ::: radio: radio0, radio_list(cnf/cur): radio0/radio0, disabled: -
Tue Apr 2 23:59:58 2024 user.debug trm-2.1.2-6[2688]: f_setdev ::: radio: radio1, radio_list(cnf/cur): radio0/radio0, disabled: 0
Tue Apr 2 23:59:58 2024 user.debug trm-2.1.2-6[2688]: f_env ::: auto_sta: -, wpa_flags: sae: ✔, owe: ✔, eap: ✘, suiteb192: ✘, sys_ver: TP-Link TL-WR902AC v3, OpenWrt 23.05.3 r23809-234f1a2efa
Tue Apr 2 23:59:58 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: false, section: , uplink_config: @uplink[3]
Tue Apr 2 23:59:58 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[3]
Tue Apr 2 23:59:59 2024 user.debug trm-2.1.2-6[2688]: f_net ::: fetch: /usr/bin/curl, timeout: 5, cp (json/html/js): -/-/-, result: net ok, error (rc/msg): 0/-, url: http://detectportal.firefox.com
Tue Apr 2 23:59:59 2024 user.debug trm-2.1.2-6[2688]: f_mac ::: action: get, section: trm_uplink6, macaddr: -, result: 60:32:B1:3C:95:D2
Tue Apr 2 23:59:59 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: connected (net ok/57), section: trm_uplink6, uplink_config: @uplink[3]
Tue Apr 2 23:59:59 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: vpn, result: 1, uplink_config: @uplink[3]
Tue Apr 2 23:59:59 2024 user.debug trm-2.1.2-6[2688]: f_jsnup ::: section: trm_uplink6, status: connected (net ok/57), sta_iface: trm_wwan, sta_radio: radio0, sta_essid: WLAN-174429, sta_bssid: -, ntp: 1, vpn: 1/0, mail: 0/0
Tue Apr 2 23:59:59 2024 user.debug trm-2.1.2-6[2688]: f_check ::: mode: initial, name: phy0-sta0, status: true, enabled: 1, connection: net ok/57, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Tue Apr 2 23:59:59 2024 user.debug trm-2.1.2-6[2688]: f_main-1 ::: status: true, proactive: 1
Wed Apr 3 00:00:00 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: , section: vpn, uplink_config: @uplink[3]
Wed Apr 3 00:00:00 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[3]
Wed Apr 3 00:00:00 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start, result: 2024.04.02-23:53:47, uplink_config: @uplink[3]
Wed Apr 3 00:00:00 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end, result: -, uplink_config: @uplink[3]
Wed Apr 3 00:00:00 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[3]
Wed Apr 3 00:00:00 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[3]
Wed Apr 3 00:00:00 2024 user.debug trm-2.1.2-6[2688]: f_setif ::: enabled: 1, section: vpn, active_sta: -, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: , section: lan, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start, result: 2024.04.02-23:53:47, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end, result: -, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_setif ::: enabled: 1, section: lan, active_sta: -, uplink_config: @uplink[3]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: , section: trm_uplink3, uplink_config: @uplink[0]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[0]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start, result: 2024.02.07-09:21:31, uplink_config: @uplink[0]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end, result: -, uplink_config: @uplink[0]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[0]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[0]
Wed Apr 3 00:00:01 2024 user.debug trm-2.1.2-6[2688]: f_setif ::: enabled: 1, section: trm_uplink3, active_sta: -, uplink_config: @uplink[0]
Wed Apr 3 00:00:01 2024 daemon.warn openvpn(my_client)[5695]: Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
Wed Apr 3 00:00:01 2024 daemon.notice openvpn(my_client)[5695]: OpenVPN 2.5.8 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Apr 3 00:00:01 2024 daemon.notice openvpn(my_client)[5695]: library versions: wolfSSL 5.6.4
Wed Apr 3 00:00:01 2024 daemon.warn openvpn(my_client)[5695]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Apr 3 00:00:01 2024 daemon.notice openvpn(my_client)[5695]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Wed Apr 3 00:00:01 2024 daemon.notice openvpn(my_client)[5695]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Apr 3 00:00:01 2024 daemon.notice openvpn(my_client)[5695]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Wed Apr 3 00:00:01 2024 daemon.notice openvpn(my_client)[5695]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Apr 3 00:00:01 2024 daemon.notice openvpn(my_client)[5695]: Control Channel MTU parms [ L:1623 D:1154 EF:96 EB:0 ET:0 EL:3 ]
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1536,tun-mtu 1500,proto TCPv4_CLIENT,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,key-method 2,tls-client'
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1536,tun-mtu 1500,proto TCPv4_SERVER,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,key-method 2,tls-server'
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: TCP/UDP: Preserving recently used remote address: [AF_INET]123.456.789.123:443
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: Attempting to establish TCP connection with [AF_INET]123.456.789.123:443 [nonblock]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: , section: trm_uplink6, uplink_config: @uplink[3]
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: TCP connection established with [AF_INET]123.456.789.123:443
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: TCP_CLIENT link local: (not bound)
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: TCP_CLIENT link remote: [AF_INET]123.456.789.123:443
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[3]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start, result: 2024.04.02-23:53:47, uplink_config: @uplink[3]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end, result: -, uplink_config: @uplink[3]
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: TLS: Initial packet from [AF_INET]123.456.789.123:443, sid=03166391 aeb0cc19
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[3]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[3]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_setif ::: enabled: 1, section: trm_uplink6, active_sta: trm_uplink6, uplink_config: @uplink[3]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: , section: trm_uplink4, uplink_config: @uplink[1]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start, result: 2024.03.30-00:19:41, uplink_config: @uplink[1]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end, result: -, uplink_config: @uplink[1]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[1]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[1]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_setif ::: enabled: 1, section: trm_uplink4, active_sta: trm_uplink6, uplink_config: @uplink[1]
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: VERIFY OK: depth=1, CN=Easy-RSA CA
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: VERIFY KU OK
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: Validating certificate extended key usage
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: VERIFY EKU OK
Wed Apr 3 00:00:02 2024 daemon.notice openvpn(my_client)[5695]: VERIFY OK: depth=0, CN=server
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: , section: trm_uplink5, uplink_config: @uplink[2]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[2]
Wed Apr 3 00:00:02 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start, result: 2024.03.22-11:31:42, uplink_config: @uplink[2]
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end, result: -, uplink_config: @uplink[2]
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[2]
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[2]
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_setif ::: enabled: 1, section: trm_uplink5, active_sta: trm_uplink6, uplink_config: @uplink[2]
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: true, section: , uplink_config: @uplink[3]
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[3]
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_check ::: mode: dev, name: -, status: true, enabled: 1, connection: net ok/57, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_main-2 ::: config_radio: radio0, config_essid: "WLAN-174429", config_bssid: -
Wed Apr 3 00:00:03 2024 user.debug trm-2.1.2-6[2688]: f_main-3 ::: radio_list: radio0, sta_list: trm_uplink3-radio0 trm_uplink6-radio0 trm_uplink4-radio0 trm_uplink5-radio0
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: [server] Peer Connection Initiated with [AF_INET]123.456.789.123:443
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: PUSH: Received control message: 'PUSH_REPLY,route-ipv6 ::/0,dhcp-option DNS 192.168.224.1,dhcp-option DNS ddaa:0:0:aab0::1,dhcp-option DOMAIN lan,redirect-gateway def1,persist-tun,persist-key,tun-ipv6,route-gateway 192.168.224.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 ddaa:0:0:aab0::1002/64 ddaa:0:0:aab0::2,ifconfig 192.168.224.3 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305'
Wed Apr 3 00:00:03 2024 daemon.err openvpn(my_client)[5695]: Options error: option 'route-ipv6' cannot be used in this context ([PUSH-OPTIONS])
Wed Apr 3 00:00:03 2024 daemon.err openvpn(my_client)[5695]: Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
Wed Apr 3 00:00:03 2024 daemon.err openvpn(my_client)[5695]: Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
Wed Apr 3 00:00:03 2024 daemon.err openvpn(my_client)[5695]: Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: Pushed option removed by filter: 'redirect-gateway def1'
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: OPTIONS IMPORT: timers and/or timeouts modified
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: OPTIONS IMPORT: --persist options modified
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: OPTIONS IMPORT: --ifconfig/up options modified
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: OPTIONS IMPORT: route-related options modified
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: OPTIONS IMPORT: peer-id set
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: OPTIONS IMPORT: adjusting link_mtu to 1626
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: OPTIONS IMPORT: data channel crypto options modified
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: Outgoing Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: Incoming Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: TUN/TAP device tun0 opened
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: do_ifconfig, ipv4=1, ipv6=1
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: net_iface_mtu_set: mtu 1500 for tun0
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: net_iface_up: set tun0 up
Wed Apr 3 00:00:03 2024 daemon.notice netifd: Network device 'tun0' link is up
Wed Apr 3 00:00:03 2024 daemon.notice netifd: Interface 'ovpn' has link connectivity
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: net_addr_v4_add: 192.168.224.3/24 dev tun0
Wed Apr 3 00:00:03 2024 daemon.notice openvpn(my_client)[5695]: net_iface_mtu_set: mtu 1500 for tun0
Wed Apr 3 00:00:04 2024 daemon.notice openvpn(my_client)[5695]: net_iface_up: set tun0 up
Wed Apr 3 00:00:04 2024 daemon.notice openvpn(my_client)[5695]: net_addr_v6_add: ddaa:0:0:aab0::1002/64 dev tun0
Wed Apr 3 00:00:04 2024 daemon.notice openvpn(my_client)[5695]: /usr/libexec/openvpn-hotplug up my_client tun0 1500 1626 192.168.224.3 255.255.255.0 init
Wed Apr 3 00:00:04 2024 user.debug trm-2.1.2-6[2688]: f_mac ::: action: get, section: trm_uplink3, macaddr: -, result: 60:32:B1:3C:95:D2
Wed Apr 3 00:00:04 2024 user.debug trm-2.1.2-6[2688]: f_main-5 ::: sta_radio: radio0, sta_essid: "HOME-3E30-2.4", sta_bssid: -
Wed Apr 3 00:00:04 2024 daemon.notice openvpn(my_client)[5695]: GID set to nogroup
Wed Apr 3 00:00:04 2024 daemon.notice openvpn(my_client)[5695]: UID set to nobody
Wed Apr 3 00:00:04 2024 daemon.notice openvpn(my_client)[5695]: Initialization Sequence Completed
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-6 ::: radio: radio0, scan_device: phy0-sta0, scan_cnt: 14
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"WLAN-174429", bssid(sta/scan): /CC:CE:1E:65:54:F3, quality(min/scan): 35/91, open: -
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"WLAN-174429", bssid(sta/scan): /9C:80:DF:17:44:9D, quality(min/scan): 35/55, open: -
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"FRITZ!Box 7590 WD", bssid(sta/scan): /44:4E:6D:54:EB:7C, quality(min/scan): 35/40, open: -
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"BRSM Technik", bssid(sta/scan): /4C:B1:CD:7D:46:D8, quality(min/scan): 35/37, open: -
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"BYOD", bssid(sta/scan): /4C:B1:CD:FD:46:D8, quality(min/scan): 35/35, open: -
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"BRSM", bssid(sta/scan): /4C:B1:CD:BD:46:D8, quality(min/scan): 35/35, open: -
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"BRSM Gast", bssid(sta/scan): /4C:B1:CD:3D:46:D8, quality(min/scan): 35/35, open: +
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_main-7 ::: radio(sta/scan): radio0/radio0, essid(sta/scan): "HOME-3E30-2.4"/"MagentaWLAN-GW06", bssid(sta/scan): /C4:EB:43:72:8C:0E, quality(min/scan): 35/34, open: -
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_mac ::: action: get, section: trm_uplink6, macaddr: -, result: 60:32:B1:3C:95:D2
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_ctrack ::: action: refresh, uplink_config: @uplink[3]
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: vpn, result: 1, uplink_config: @uplink[3]
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: vpnservice, result: openvpn, uplink_config: @uplink[3]
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: vpniface, result: ovpn, uplink_config: @uplink[3]
Wed Apr 3 00:00:08 2024 user.debug trm-2.1.2-6[2688]: f_vpn ::: vpn: 1, action: enable_keep, service: openvpn, iface: ovpn, instance: mullvad_client
Wed Apr 3 00:00:09 2024 daemon.notice netifd: Interface 'ovpn' has link connectivity loss
Wed Apr 3 00:00:09 2024 daemon.notice netifd: Interface 'ovpn' is enabled
Wed Apr 3 00:00:09 2024 daemon.notice netifd: Network device 'tun0' link is up
Wed Apr 3 00:00:09 2024 daemon.notice netifd: Interface 'ovpn' has link connectivity
Wed Apr 3 00:00:09 2024 daemon.notice netifd: Interface 'ovpn' is setting up now
Wed Apr 3 00:00:09 2024 daemon.notice netifd: Interface 'ovpn' is now up
Wed Apr 3 00:00:10 2024 user.info trm-vpn [6011]: openvpn client connection enabled 'ovpn/mullvad_client'
Wed Apr 3 00:00:10 2024 user.debug trm-2.1.2-6[2688]: f_mac ::: action: get, section: trm_uplink6, macaddr: -, result: 60:32:B1:3C:95:D2
Wed Apr 3 00:00:11 2024 user.debug trm-2.1.2-6[2688]: f_getcfg ::: status: connected (net ok/57), section: trm_uplink6, uplink_config: @uplink[3]
Wed Apr 3 00:00:11 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: vpn, result: 1, uplink_config: @uplink[3]
Wed Apr 3 00:00:11 2024 user.debug trm-2.1.2-6[2688]: f_getval ::: option: vpniface, result: ovpn, uplink_config: @uplink[3]
Wed Apr 3 00:00:11 2024 user.notice firewall: Reloading firewall due to ifup of ovpn (tun0)
Wed Apr 3 00:00:11 2024 user.debug trm-2.1.2-6[2688]: f_jsnup ::: section: trm_uplink6, status: connected (net ok/57), sta_iface: trm_wwan, sta_radio: radio0, sta_essid: WLAN-174429, sta_bssid: -, ntp: 1, vpn: 1/1, mail: 0/0
Wed Apr 3 00:00:11 2024 user.debug trm-2.1.2-6[2688]: f_vpn ::: vpn: 1, enabled: 1, action: enable_keep, vpn_service: openvpn, vpn_iface: ovpn, vpn_instance: mullvad_client, vpn_infolist: wg ovpn&&mullvad_client, result: , rc: 0
Wed Apr 3 00:00:11 2024 user.debug trm-2.1.2-6[2688]: f_main-4 ::: config_radio: radio0, config_essid: WLAN-174429, config_bssid: -d
The be sure I removed the disabled openvpn configuration and rebooted. Everything went back to normal. I am writing this text on this system now after I added it back one more time and removed it again. It looks, like travelmate is confused when it has to deal with more than one configuration even if they are disabled.
But then how is the VPN handled, given that it's interface is supposed to be set to not automatically come up, because travelmate handles bringing it up once it has found a wifi AP to connect to?
I must have overlooked, but how can I easily and quickly switch from 1 uplink to another one? Both wifi uplink networks are available at the same time (e.g. 2.4 or 5GHz networks)?
Using what devices?
Manually or automatically?
Manually i mean, so how can i select another uplink whilst in the openwrt travel mate Luci environment.
I tried to turn the connected one off but the other uplink was not activated and connected to automatically and manually I could not do that either.
In my limited use of Travelmate I think you are going out of bounds.
Travelmate is not meant to be used like that: It is not set up to have multiple APs to choose from at one time; it is meant to facilitate traveling and use the Hotspot it recognizes from a previous use or a new Hotspot.
If you are trying to pick one AP from another you should use the wireless settings.
Sorry, that's out of scope - only simple VPN configurations are supported.
Than please do not use the simple vpn implementation for such complex scenarios.
Fair enough, that is ok. Thank you for the clarification, I was not sure about this. I can work around this and write and simple script for switching configurations by some uci commands and make it accessible by luci-app-commands and as configured ssh command for an public key. That way only one configuration is loaded at a time.
I don't have to use the simple vpn implementation. I'm happy to use something else better suited, but I am not aware of what the options other than what you are referring to as the simple one, that works for both Travelmate connected WiFi connections and Ethernet WAN connections.
FWIW, I am using WireGuard for my VPN. It's implemented as an interface in OpenWRT (as you know) which has an option to be started on boot or not. Of course for Travelmate, we can't have it start on boot, so what other way than what you are referring to as the simple vpn implementation is there to have that interface started only after Travelmate has found an uplink (or an Ethernet connection has been connected)?
I wonder though, is supporting an Ethernet WAN as an option really that complex a scenario? It seems like it could be a pretty common choice to have when you take a travel router somewhere. If the location provides hard-wired Ethernet and (or as an alternative to) WiFi, surely everyone is going to choose a hard-wired Ethernet for speed and reliability at least.
Anyway, open to suggestions for alternatives to the simple vpn implementation and always happy to learn about something I did not previously know about.
The problem occurs on both 2.4GHz and 5GHz radios. Disabling the AP on either radio would allow the STA client on that radio to connect successfully.
DEBUG LOG
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: , uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_jsnup ::: section: -, status: running (not connected), sta_iface: -, sta_radio: -, sta_essid: -, sta_bssid: -, ntp: 1, vpn: 0/0, mail: 0/0
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: initial, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_main-1 ::: status: false, proactive: 1
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: default_radio1, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: , section: default_radio1, active_sta: -, uplink_config: -
Thu Apr 4 19:32:16 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: trm_uplink3, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: 2024.04.04-19:24:03, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: 2024.04.04-19:29:23, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: 0, section: trm_uplink3, active_sta: -, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: wifinet2, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: 2024.04.04-19:24:03, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: 2024.04.04-19:29:23, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: 0, section: wifinet2, active_sta: -, uplink_config: @uplink[0]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start, result: 2024.03.31-12:20:30, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end, result: 2024.04.01-13:42:52, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_start_expiry, result: 0, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: con_end_expiry, result: 0, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_setif ::: enabled: 1, section: trm_uplink4, active_sta: -, uplink_config: @uplink[1]
Thu Apr 4 19:32:17 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: , uplink_config: @uplink[1]
Thu Apr 4 19:32:22 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 5
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: dev, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_main-3 ::: radio_list: radio0 radio1, sta_list: trm_uplink4-radio1
Thu Apr 4 19:32:28 2024 user.info trm-2.1.2-r6[13368]: no enabled station on radio 'radio0'
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: get, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:32:28 2024 user.debug trm-2.1.2-r6[13368]: f_main-5 ::: sta_radio: radio1, sta_essid: "myssid-2.4ghz", sta_bssid: -
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_main-6 ::: radio: radio1, scan_device: phy1-ap0, scan_cnt: 46
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_main-7 ::: radio(sta/scan): radio1/radio1, essid(sta/scan): "myssid-2.4ghz"/"myssid-2.4ghz", bssid(sta/scan): /10:DA:43:14:9B:58, quality(min/scan): 35/100, open: -
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: , section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:32:31 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: macaddr, result: -, uplink_config: @uplink[1]
Thu Apr 4 19:32:32 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: set, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:32:32 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:32:32 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]
Thu Apr 4 19:32:56 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 23
Thu Apr 4 19:33:28 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: sta, name: phy1-sta0, status: , enabled: 1, connection: -, wait: 31, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:33:29 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:33:50 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 20
Thu Apr 4 19:33:50 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: rev, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:33:50 2024 user.debug trm-2.1.2-r6[13368]: f_jsnup ::: section: -, status: running (not connected), sta_iface: -, sta_radio: -, sta_essid: -, sta_bssid: -, ntp: 1, vpn: 0/0, mail: 0/0
Thu Apr 4 19:33:50 2024 user.info trm-2.1.2-r6[13368]: can't connect to uplink 'radio1/myssid-2.4ghz/-' (1/3)
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: macaddr, result: -, uplink_config: @uplink[1]
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: set, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:33:55 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]
Thu Apr 4 19:34:22 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 23
Thu Apr 4 19:34:54 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: sta, name: phy1-sta0, status: , enabled: 1, connection: -, wait: 31, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:34:54 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:35:12 2024 user.debug trm-2.1.2-r6[13368]: f_wifi ::: radio_list: radio0 radio1, radio: radio1, timeout: 17
Thu Apr 4 19:35:12 2024 user.debug trm-2.1.2-r6[13368]: f_check ::: mode: rev, name: -, status: false, enabled: 1, connection: -, wait: 1, max_wait: 30, min_quality: 35, captive: 1, netcheck: 0
Thu Apr 4 19:35:12 2024 user.debug trm-2.1.2-r6[13368]: f_jsnup ::: section: -, status: running (not connected), sta_iface: -, sta_radio: -, sta_essid: -, sta_bssid: -, ntp: 1, vpn: 0/0, mail: 0/0
Thu Apr 4 19:35:12 2024 user.info trm-2.1.2-r6[13368]: can't connect to uplink 'radio1/myssid-2.4ghz/-' (2/3)
Thu Apr 4 19:35:17 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: macaddr, result: -, uplink_config: @uplink[1]
Thu Apr 4 19:35:18 2024 user.debug trm-2.1.2-r6[13368]: f_mac ::: action: set, section: trm_uplink4, macaddr: -, result: -
Thu Apr 4 19:35:18 2024 user.debug trm-2.1.2-r6[13368]: f_getcfg ::: status: false, section: trm_uplink4, uplink_config: @uplink[1]
Thu Apr 4 19:35:18 2024 user.debug trm-2.1.2-r6[13368]: f_getval ::: option: enabled, result: 1, uplink_config: @uplink[1]myssid
I'm not allowed to just reply with 'SMH'.
I figured it out, sort of....
I toggled the unwanted uplink to off and then reboot, then the Travelmate router connects to the other one. So not on the fly as I thought, but it's ok like this.
Can you expand? Am I asking a stupid question?
Hi @dibdot,
I raised the connection limit and it did connect to my main router (on the fourth attempt), but it often disconnects, especially if I enable the access point. The connection is much more stable if I don't use Travelmate.
As for your advice to "just check the readme," the readme on Github is mostly a reference document. It provides very little advice on how to troubleshoot connection problems.