I did it. Unfortunately it didn't work
Here is the log
BusyBox v1.30.1 () built-in shell (ash)
_______ ________ __
| |.-----.-----.-----.| | | |.----.| |_
| - || _ | -__| || | | || _|| _|
|_______|| __|_____|__|__||________||__| |____|
|__| W I R E L E S S F R E E D O M
-----------------------------------------------------
OpenWrt 19.07.7, r11306-c4a6851c72
-----------------------------------------------------
root@GL-AR750S:~# logread -e openvpn
Thu Dec 23 01:39:27 2021 daemon.notice procd: /etc/rc.d/S90vpn-service: cat: can't open '/etc/openvpn/ovpn/server.ovpn': No such file or directory
Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4094]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4094]: OpenVPN 2.5.0 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4094]: library versions: OpenSSL 1.1.1i 8 Dec 2020Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4226]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4226]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: TCP/UDP: Preserving recently used remote address: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: UDP link local: (not bound)
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: UDP link remote: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: TLS: Initial packet from [AF_INET]81.19.217.3:1194, sid=85fc1f24 8b916d1d
Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4226]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY KU OK
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Validating certificate extended key usage
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY EKU OK
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY OK: depth=0, CN=uk877.nordvpn.com
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: [uk877.nordvpn.com] Peer Connection Initiated with [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: SENT CONTROL [uk877.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.254.61 255.255.0.0,peer-id 3,cipher AES-256-GCM'
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: compression parms modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: route options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: route-related options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: peer-id set
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan-sta
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: TUN/TAP device tun0 opened
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_iface_mtu_set: mtu 1500 for tun0
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_iface_up: set tun0 up
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_addr_v4_add: 10.8.254.61/16 dev tun0
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.254.61 255.255.0.0 init
Thu Dec 23 01:40:50 2021 daemon.notice openvpn[4226]: net_route_v4_add: 81.19.217.3/32 via 192.168.1.1 dev [NULL] table 0 metric -1
Thu Dec 23 01:40:50 2021 daemon.notice openvpn[4226]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 01:40:50 2021 daemon.notice openvpn[4226]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4852]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4852]: OpenVPN 2.5.0 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4852]: library versions: OpenSSL 1.1.1i 8 Dec 2020Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4887]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4887]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: TCP/UDP: Preserving recently used remote address: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: UDP link local: (not bound)
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: UDP link remote: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: TLS: Initial packet from [AF_INET]81.19.217.3:1194, sid=c143125f 91e5031c
Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4887]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY KU OK
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Validating certificate extended key usage
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY EKU OK
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY OK: depth=0, CN=uk877.nordvpn.com
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: [uk877.nordvpn.com] Peer Connection Initiated with [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: SENT CONTROL [uk877.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.254.61 255.255.0.0,peer-id 9,cipher AES-256-GCM'
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: compression parms modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: route options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: route-related options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: peer-id set
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan-sta
Thu Dec 23 01:40:54 2021 daemon.err openvpn[4887]: ERROR: Cannot ioctl TUNSETIFF tun0: Resource busy (errno=16)
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Exiting due to fatal error
Thu Dec 23 01:41:01 2021 daemon.notice openvpn[4226]: Initialization Sequence Completed
root@GL-AR750S:~#