VPN connected, no internet (NordVPN)

Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.397894] 5 fixed-partitions partitions found on MTD device spi0.0
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.404447] Creating 5 MTD partitions on "spi0.0":Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.409428] 0x000000000000-0x000000040000 : "u-boot"
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.415246] 0x000000040000-0x000000050000 : "u-boot-env"
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.421467] 0x000000050000-0x000000060000 : "art"
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.427028] 0x000000060000-0x000000260000 : "kernel"
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.432778] 0x000000260000-0x000000e20000 : "nor_reserved"
Thu Dec 23 00:44:31 2021 kern.info kernel: [    0.442189] spi-nand: Mxic SPI NAND was found.
Thu Dec 23 00:44:31 2021 kern.info kernel: [    0.446832] spi-nand: 128 MiB, block size: 128 KiB, page size: 2048, OOB size: 128
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.454733] 1 fixed-partitions partitions found on MTD device spi0.1
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.461316] Creating 1 MTD partitions on "spi0.1":Thu Dec 23 00:44:31 2021 kern.notice kernel: [    0.466286] 0x000000000000-0x000008000000 : "ubi"
Thu Dec 23 00:44:31 2021 kern.info kernel: [    0.896630] libphy: Fixed MDIO Bus: probed
Thu Dec 23 00:44:31 2021 kern.info kernel: [    1.576554] libphy: ag71xx_mdio: probed
Thu Dec 23 00:44:31 2021 kern.info kernel: [    1.583533] switch0: Atheros AR8337 rev. 2 switch registered on mdio-bus.0
Thu Dec 23 00:44:31 2021 kern.info kernel: [    2.237666] ag71xx 19000000.eth: connected to PHY at mdio-bus.0:00 [uid=004dd036, driver=Atheros AR8216/AR8236/AR8316]
Thu Dec 23 00:44:31 2021 kern.info kernel: [    2.249271] eth0: Atheros AG71xx at 0xb9000000, irq 4, mode: mii
Thu Dec 23 00:44:31 2021 kern.info kernel: [    2.257278] NET: Registered protocol family 10
Thu Dec 23 00:44:31 2021 kern.info kernel: [    2.265734] Segment Routing with IPv6
Thu Dec 23 00:44:31 2021 kern.info kernel: [    2.269659] NET: Registered protocol family 17
Thu Dec 23 00:44:31 2021 kern.info kernel: [    2.274296] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Thu Dec 23 00:44:31 2021 kern.info kernel: [    2.287694] 8021q: 802.1Q VLAN Support v1.8
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    2.297646] UBI: auto-attach mtd5
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    2.301098] ubi0: attaching mtd5
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    2.586205] random: fast init done
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.110533] ubi0: scanning is finished
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.167394] ubi0: attached mtd5 (name "ubi", size 128 MiB)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.173068] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.180209] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.187231] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.194417] ubi0: good PEBs: 1024, bad PEBs: 0, corrupted PEBs: 0
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.200722] ubi0: user volume: 2, internal volumes: 1, max. volumes count: 128
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.208188] ubi0: max/mean erase counter: 6/2, WL threshold: 4096, image sequence number: 796008383
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.217540] ubi0: available PEBs: 0, total reserved PEBs: 1024, PEBs reserved for bad PEB handling: 20
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.227232] ubi0: background thread "ubi_bgt0d" started, PID 320
Thu Dec 23 00:44:31 2021 kern.info kernel: [    7.236834] block ubiblock0_0: created from ubi0:0(rootfs)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [    7.242508] ubiblock: device ubiblock0_0 (rootfs) set to be root filesystem
Thu Dec 23 00:44:31 2021 kern.info kernel: [    7.269450] VFS: Mounted root (squashfs filesystem) readonly on device 254:0.
Thu Dec 23 00:44:31 2021 kern.info kernel: [    7.283628] Freeing unused kernel memory: 1252K
Thu Dec 23 00:44:31 2021 kern.warn kernel: [    7.288342] This architecture does not have kernel memory protection.
Thu Dec 23 00:44:31 2021 user.info kernel: [    8.212333] init: Console is alive
Thu Dec 23 00:44:31 2021 user.info kernel: [    8.216045] init: - watchdog -
Thu Dec 23 00:44:31 2021 user.info kernel: [   11.473881] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.679376] usbcore: registered new interface driver usbfs
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.685092] usbcore: registered new interface driver hub
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.690708] usbcore: registered new device driver usb
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.705727] exFAT: Version 1.2.9
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.740463] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   11.755754] SCSI subsystem initialized
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.764799] ehci-platform: EHCI generic platform driver
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.770474] ehci-platform 1b000000.usb: EHCI Host Controller
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.776382] ehci-platform 1b000000.usb: new USB bus registered, assigned bus number 1
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.784549] ehci-platform 1b000000.usb: irq 13, io mem 0x1b000000
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.816280] ehci-platform 1b000000.usb: USB 2.0 started, EHCI 1.00
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.823390] hub 1-0:1.0: USB hub found
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.827611] hub 1-0:1.0: 1 port detected
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.832196] ehci-platform 1b400000.usb: EHCI Host Controller
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.838124] ehci-platform 1b400000.usb: new USB bus registered, assigned bus number 2
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.846345] ehci-platform 1b400000.usb: irq 14, io mem 0x1b400000
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.876249] ehci-platform 1b400000.usb: USB 2.0 started, EHCI 1.00
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.883394] hub 2-0:1.0: USB hub found
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.887630] hub 2-0:1.0: 1 port detected
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.895425] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.903431] ohci-platform: OHCI generic platform driver
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.911501] uhci_hcd: USB Universal Host Controller Interface driver
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.922424] usbcore: registered new interface driver usb-storage
Thu Dec 23 00:44:31 2021 kern.info kernel: [   11.930995] usbcore: registered new interface driver uas
Thu Dec 23 00:44:31 2021 user.info kernel: [   11.937318] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Thu Dec 23 00:44:31 2021 user.info kernel: [   11.955192] init: - preinit -
Thu Dec 23 00:44:31 2021 kern.info kernel: [   12.886277] usb 2-1: new high-speed USB device number 2 using ehci-platform
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   13.152157] random: procd: uninitialized urandom read (4 bytes read)
Thu Dec 23 00:44:31 2021 kern.info kernel: [   13.159225] usb-storage 2-1:1.0: USB Mass Storage device detected
Thu Dec 23 00:44:31 2021 kern.info kernel: [   13.175526] scsi host0: usb-storage 2-1:1.0
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   13.617520] random: jshn: uninitialized urandom read (4 bytes read)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   13.811484] random: jshn: uninitialized urandom read (4 bytes read)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   14.197256] scsi 0:0:0:0: Direct-Access     Multiple Card  Reader     1.00 PQ: 0 ANSI: 0
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   14.209422] sd 0:0:0:0: [sda] Attached SCSI removable disk
Thu Dec 23 00:44:31 2021 kern.info kernel: [   15.806097] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
Thu Dec 23 00:44:31 2021 kern.info kernel: [   15.812245] IPv6: ADDRCONF(NETDEV_UP): eth0.1: link is not ready
Thu Dec 23 00:44:31 2021 kern.info kernel: [   16.837517] eth0: link up (1000Mbps/Full duplex)
Thu Dec 23 00:44:31 2021 kern.info kernel: [   16.842376] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Thu Dec 23 00:44:31 2021 kern.info kernel: [   16.849192] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.1: link becomes ready
Thu Dec 23 00:44:31 2021 user.info kernel: [   19.040826] mount_root: loading kmods from internal overlay
Thu Dec 23 00:44:31 2021 user.info kernel: [   19.113685] kmodloader: loading kernel modules from //etc/modules-boot.d/*
Thu Dec 23 00:44:31 2021 user.info kernel: [   19.125042] kmodloader: done loading kernel modules from //etc/modules-boot.d/*
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   20.176614] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 497
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   20.459921] UBIFS (ubi0:1): recovery needed
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.158374] UBIFS (ubi0:1): recovery completed
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.163050] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.171170] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.181428] UBIFS (ubi0:1): FS size: 112373760 bytes (107 MiB, 885 LEBs), journal size 5586944 bytes (5 MiB, 44 LEBs)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.192393] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.199240] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 6F74FBE6-10BC-4B3B-945A-BC0F5C4C0DCB, small LPT model
Thu Dec 23 00:44:31 2021 user.info kernel: [   21.227649] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Thu Dec 23 00:44:31 2021 user.info kernel: [   21.280445] block: extroot: not configured
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.284879] UBIFS (ubi0:1): un-mount UBI device 0
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.289803] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" stops
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.317748] UBIFS (ubi0:1): background thread "ubifs_bgt0_1" started, PID 500
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.838247] UBIFS (ubi0:1): UBIFS: mounted UBI device 0, volume 1, name "rootfs_data"
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.846384] UBIFS (ubi0:1): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.856635] UBIFS (ubi0:1): FS size: 112373760 bytes (107 MiB, 885 LEBs), journal size 5586944 bytes (5 MiB, 44 LEBs)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.867605] UBIFS (ubi0:1): reserved for root: 4952683 bytes (4836 KiB)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   21.874433] UBIFS (ubi0:1): media format: w4/r0 (latest is w5/r0), UUID 6F74FBE6-10BC-4B3B-945A-BC0F5C4C0DCB, small LPT model
Thu Dec 23 00:44:31 2021 user.info kernel: [   21.931457] mount_root: loading kmods from internal overlay
Thu Dec 23 00:44:31 2021 user.info kernel: [   21.999626] kmodloader: loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Thu Dec 23 00:44:31 2021 user.info kernel: [   22.020055] kmodloader: done loading kernel modules from /tmp/overlay/upper/etc/modules-boot.d/*
Thu Dec 23 00:44:31 2021 user.info kernel: [   22.870717] block: attempting to load /tmp/ubifs_cfg/upper/etc/config/fstab
Thu Dec 23 00:44:31 2021 user.info kernel: [   22.907943] block: extroot: not configured
Thu Dec 23 00:44:31 2021 user.info kernel: [   22.926742] mount_root: switching to ubifs overlay
Thu Dec 23 00:44:31 2021 user.warn kernel: [   23.056472] urandom-seed: Seeding with /etc/urandom.seed
Thu Dec 23 00:44:31 2021 kern.info kernel: [   23.287126] eth0: link down
Thu Dec 23 00:44:31 2021 user.info kernel: [   23.308786] procd: - early -
Thu Dec 23 00:44:31 2021 user.info kernel: [   23.311853] procd: - watchdog -
Thu Dec 23 00:44:31 2021 kern.warn kernel: [   23.868825] urandom_read: 5 callbacks suppressed
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   23.868831] random: jshn: uninitialized urandom read (4 bytes read)
Thu Dec 23 00:44:31 2021 user.info kernel: [   23.994225] procd: - watchdog -
Thu Dec 23 00:44:31 2021 user.info kernel: [   23.997810] procd: - ubus -
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   24.222516] random: ubusd: uninitialized urandom read (4 bytes read)
Thu Dec 23 00:44:31 2021 user.info kernel: [   24.272101] procd: - init -
Thu Dec 23 00:44:31 2021 user.info kernel: [   28.678462] kmodloader: loading kernel modules from /etc/modules.d/*
Thu Dec 23 00:44:31 2021 user.info kernel: [   28.739121] urngd: v1.0.2 started.
Thu Dec 23 00:44:31 2021 kern.info kernel: [   28.847468] ntfs: driver 2.1.32 [Flags: R/O MODULE].Thu Dec 23 00:44:31 2021 kern.info kernel: [   28.893282] tun: Universal TUN/TAP device driver, 1.6
Thu Dec 23 00:44:31 2021 kern.info kernel: [   28.959262] ip6_tables: (C) 2000-2006 Netfilter Core Team
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.003504] nf_conntrack version 0.5.0 (2048 buckets, 8192 max)
Thu Dec 23 00:44:31 2021 kern.notice kernel: [   29.107156] random: crng init done
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.259962] Netfilter messages via NETLINK v0.30.
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.267408] ip_set: protocol 6
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.375320] Mirror/redirect action on
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.417551] u32 classifier
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.420360]     input device check on
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.424138]     Actions configured
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.499313] GACT probability on
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.522208] Simple TC action Loaded
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.602903] fuse init (API version 7.26)
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.645766] usbcore: registered new interface driver cdc_acm
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.651673] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.701336] usbcore: registered new interface driver cdc_wdm
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.727980] Loading modules backported from Linux version v4.19.161-0-gdaefdc9eb24b
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.735895] Backport generated by backports.git v4.19.161-1-0-g4bb568fe
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.810377] Ebtables v2.0 registered
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.838983] ip_tables: (C) 2000-2006 Netfilter Core Team
Thu Dec 23 00:44:31 2021 kern.info kernel: [   29.858188] usbcore: registered new interface driver ipheth
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.108560] ctnetlink v0.93: registering with nfnetlink.
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.462443] usbcore: registered new interface driver usbserial
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.468616] usbcore: registered new interface driver usbserial_generic
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.475415] usbserial: USB Serial support registered for generic
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.551754] wireguard: WireGuard 1.0.20200611 loaded. See www.wireguard.com for information.
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.560535] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.678710] xt_time: kernel timezone is -0000
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.689050] usbcore: registered new interface driver cdc_ether
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.710377] usbcore: registered new interface driver cdc_ncm
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.830464] usbcore: registered new interface driver cp210x
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.836364] usbserial: USB Serial support registered for cp210x
Thu Dec 23 00:44:31 2021 kern.info kernel: [   30.876266] usbcore: registered new interface driver huawei_cdc_ncm
Thu Dec 23 00:44:31 2021 kern.info kernel: [   31.060266] PPP generic driver version 2.4.2
Thu Dec 23 00:44:31 2021 kern.info kernel: [   31.079941] PPP MPPE Compression module registered
Thu Dec 23 00:44:31 2021 kern.info kernel: [   31.104508] NET: Registered protocol family 24
Thu Dec 23 00:44:31 2021 kern.info kernel: [   31.121611] usbcore: registered new interface driver qmi_wwan
Thu Dec 23 00:44:31 2021 kern.info kernel: [   31.159310] usbcore: registered new interface driver rndis_host

This is the log from your command

are you sure?
logread -e openvpn
should return only the log lines that have openvpn in the text.

If that doesn't work, maybe

logread | grep openvpn

Ok, here it is:


Hide quoted text

---------- Forwarded message ---------
From: Erez Peretz <erez.peretz@gmail.com>
Date: Thu, Dec 23, 2021, 00:18
Subject:
To: Erez Peretz <Erezperetz@gmail.com>


BusyBox v1.30.1 () built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 19.07.7, r11306-c4a6851c72
 -----------------------------------------------------
root@GL-AR750S:~# logread -e openvpn
Thu Dec 23 00:44:57 2021 daemon.notice procd: /etc/rc.d/S90vpn-service: cat: can't open '/etc/openvpn/ovpn/server.ovpn': No such file or directory
Thu Dec 23 00:46:18 2021 daemon.warn openvpn[4122]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4122]: OpenVPN 2.5.0 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4122]: library versions: OpenSSL 1.1.1i  8 Dec 2020Thu Dec 23 00:46:18 2021 daemon.warn openvpn[4244]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Dec 23 00:46:18 2021 daemon.warn openvpn[4244]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: TCP/UDP: Preserving recently used remote address: [AF_INET]81.19.217.3:1194
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: UDP link local: (not bound)
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: UDP link remote: [AF_INET]81.19.217.3:1194
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: TLS: Initial packet from [AF_INET]81.19.217.3:1194, sid=22f1c3ae 05e93a24
Thu Dec 23 00:46:18 2021 daemon.warn openvpn[4244]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: VERIFY KU OK
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: Validating certificate extended key usage
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: VERIFY EKU OK
Thu Dec 23 00:46:18 2021 daemon.notice openvpn[4244]: VERIFY OK: depth=0, CN=uk877.nordvpn.com
Thu Dec 23 00:46:19 2021 daemon.notice openvpn[4244]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Dec 23 00:46:19 2021 daemon.notice openvpn[4244]: [uk877.nordvpn.com] Peer Connection Initiated with [AF_INET]81.19.217.3:1194
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: SENT CONTROL [uk877.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.254.61 255.255.0.0,peer-id 2,cipher AES-256-GCM'
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: compression parms modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: route options modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: route-related options modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: peer-id set
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan-sta
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: TUN/TAP device tun0 opened
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: net_iface_mtu_set: mtu 1500 for tun0
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: net_iface_up: set tun0 up
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: net_addr_v4_add: 10.8.254.61/16 dev tun0
Thu Dec 23 00:46:20 2021 daemon.notice openvpn[4244]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.254.61 255.255.0.0 init
Thu Dec 23 00:46:22 2021 daemon.notice openvpn[4244]: net_route_v4_add: 81.19.217.3/32 via 192.168.1.1 dev [NULL] table 0 metric -1
Thu Dec 23 00:46:22 2021 daemon.notice openvpn[4244]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 00:46:22 2021 daemon.notice openvpn[4244]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 00:46:26 2021 daemon.warn openvpn[4889]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4889]: OpenVPN 2.5.0 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4889]: library versions: OpenSSL 1.1.1i  8 Dec 2020Thu Dec 23 00:46:26 2021 daemon.warn openvpn[4914]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Dec 23 00:46:26 2021 daemon.warn openvpn[4914]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: TCP/UDP: Preserving recently used remote address: [AF_INET]81.19.217.3:1194
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: UDP link local: (not bound)
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: UDP link remote: [AF_INET]81.19.217.3:1194
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: TLS: Initial packet from [AF_INET]81.19.217.3:1194, sid=4e84c553 1008e0bf
Thu Dec 23 00:46:26 2021 daemon.warn openvpn[4914]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: VERIFY KU OK
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: Validating certificate extended key usage
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: VERIFY EKU OK
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: VERIFY OK: depth=0, CN=uk877.nordvpn.com
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Dec 23 00:46:26 2021 daemon.notice openvpn[4914]: [uk877.nordvpn.com] Peer Connection Initiated with [AF_INET]81.19.217.3:1194
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: SENT CONTROL [uk877.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.254.61 255.255.0.0,peer-id 3,cipher AES-256-GCM'
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: compression parms modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: route options modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: route-related options modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: peer-id set
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan-sta
Thu Dec 23 00:46:27 2021 daemon.err openvpn[4914]: ERROR: Cannot ioctl TUNSETIFF tun0: Resource busy (errno=16)
Thu Dec 23 00:46:27 2021 daemon.notice openvpn[4914]: Exiting due to fatal error
Thu Dec 23 00:46:37 2021 daemon.notice openvpn[4244]: Initialization Sequence Completed
Thu Dec 23 00:52:28 2021 user.info : 1246: gl-vpn-client>> Stop, vpnpath=/etc/openvpn/ovpn1, serverfile=uk877.nordvpn.com.udp1194.ovpn
Thu Dec 23 00:52:36 2021 user.info : 1246: gl-vpn-client>> Start, vpnpath=/etc/openvpn/ovpn1, serverfile=uk877.nordvpn.com.udp1194.ovpn
Thu Dec 23 00:52:36 2021 user.info : 1323: gl-vpn-client>> glconfig.openvpn.ovpn=/etc/openvpn/ovpn1/uk877.nordvpn.com.udp1194.ovpn, glconfig.openvpn.clientid=ovpn1
Thu Dec 23 00:52:42 2021 daemon.warn openvpn[15652]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15652]: OpenVPN 2.5.0 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15652]: library versions: OpenSSL 1.1.1i  8 Dec 2020
Thu Dec 23 00:52:42 2021 daemon.warn openvpn[15664]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Dec 23 00:52:42 2021 daemon.warn openvpn[15664]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15664]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15664]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15664]: TCP/UDP: Preserving recently used remote address: [AF_INET]81.19.217.3:1194
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15664]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15664]: UDP link local: (not bound)
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15664]: UDP link remote: [AF_INET]81.19.217.3:1194
Thu Dec 23 00:52:42 2021 daemon.notice openvpn[15664]: TLS: Initial packet from [AF_INET]81.19.217.3:1194, sid=995a48b4 60bdceca
Thu Dec 23 00:52:42 2021 daemon.warn openvpn[15664]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: VERIFY KU OK
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: Validating certificate extended key usage
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: VERIFY EKU OK
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: VERIFY OK: depth=0, CN=uk877.nordvpn.com
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Dec 23 00:52:43 2021 daemon.notice openvpn[15664]: [uk877.nordvpn.com] Peer Connection Initiated with [AF_INET]81.19.217.3:1194
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: SENT CONTROL [uk877.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.254.61 255.255.0.0,peer-id 3,cipher AES-256-GCM'
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: compression parms modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: route options modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: route-related options modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: peer-id set
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan-sta
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: TUN/TAP device tun0 opened
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: net_iface_mtu_set: mtu 1500 for tun0
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: net_iface_up: set tun0 up
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: net_addr_v4_add: 10.8.254.61/16 dev tun0
Thu Dec 23 00:52:44 2021 daemon.notice openvpn[15664]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.254.61 255.255.0.0 init
Thu Dec 23 00:52:46 2021 daemon.notice openvpn[15664]: net_route_v4_add: 81.19.217.3/32 via 192.168.1.1 dev [NULL] table 0 metric -1
Thu Dec 23 00:52:46 2021 daemon.notice openvpn[15664]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 00:52:46 2021 daemon.notice openvpn[15664]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 00:52:54 2021 daemon.notice openvpn[15664]: Initialization Sequence Completed
Thu Dec 23 00:54:09 2021 user.info : 1246: gl-vpn-client>> Stop, vpnpath=/etc/openvpn/ovpn1, serverfile=uk877.nordvpn.com.udp1194.ovpn
root@GL-AR750S:~#

This is the configuration file

client
dev tun
proto udp
remote 81.19.217.3 1194
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo no

remote-cert-tls server

auth-user-pass
verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512

<ca>
-----BEGIN CERTIFICATE-----
MIIFCjCCAvKgAwIBAgIBATANBgkqhkiG9w0BAQ0FADA5MQswCQYDVQQGEwJQQTEQ
MA4GA1UEChMHTm9yZFZQTjEYMBYGA1UEAxMPTm9yZFZQTiBSb290IENBMB4XDTE2
MDEwMTAwMDAwMFoXDTM1MTIzMTIzNTk1OVowOTELMAkGA1UEBhMCUEExEDAOBgNV
BAoTB05vcmRWUE4xGDAWBgNVBAMTD05vcmRWUE4gUm9vdCBDQTCCAiIwDQYJKoZI
hvcNAQEBBQADggIPADCCAgoCggIBAMkr/BYhyo0F2upsIMXwC6QvkZps3NN2/eQF
kfQIS1gql0aejsKsEnmY0Kaon8uZCTXPsRH1gQNgg5D2gixdd1mJUvV3dE3y9FJr
XMoDkXdCGBodvKJyU6lcfEVF6/UxHcbBguZK9UtRHS9eJYm3rpL/5huQMCppX7kU
eQ8dpCwd3iKITqwd1ZudDqsWaU0vqzC2H55IyaZ/5/TnCk31Q1UP6BksbbuRcwOV
skEDsm6YoWDnn/IIzGOYnFJRzQH5jTz3j1QBvRIuQuBuvUkfhx1FEwhwZigrcxXu
MP+QgM54kezgziJUaZcOM2zF3lvrwMvXDMfNeIoJABv9ljw969xQ8czQCU5lMVmA
37ltv5Ec9U5hZuwk/9QO1Z+d/r6Jx0mlurS8gnCAKJgwa3kyZw6e4FZ8mYL4vpRR
hPdvRTWCMJkeB4yBHyhxUmTRgJHm6YR3D6hcFAc9cQcTEl/I60tMdz33G6m0O42s
Qt/+AR3YCY/RusWVBJB/qNS94EtNtj8iaebCQW1jHAhvGmFILVR9lzD0EzWKHkvy
WEjmUVRgCDd6Ne3eFRNS73gdv/C3l5boYySeu4exkEYVxVRn8DhCxs0MnkMHWFK6
MyzXCCn+JnWFDYPfDKHvpff/kLDobtPBf+Lbch5wQy9quY27xaj0XwLyjOltpiST
LWae/Q4vAgMBAAGjHTAbMAwGA1UdEwQFMAMBAf8wCwYDVR0PBAQDAgEGMA0GCSqG
SIb3DQEBDQUAA4ICAQC9fUL2sZPxIN2mD32VeNySTgZlCEdVmlq471o/bDMP4B8g
nQesFRtXY2ZCjs50Jm73B2LViL9qlREmI6vE5IC8IsRBJSV4ce1WYxyXro5rmVg/
k6a10rlsbK/eg//GHoJxDdXDOokLUSnxt7gk3QKpX6eCdh67p0PuWm/7WUJQxH2S
DxsT9vB/iZriTIEe/ILoOQF0Aqp7AgNCcLcLAmbxXQkXYCCSB35Vp06u+eTWjG0/
pyS5V14stGtw+fA0DJp5ZJV4eqJ5LqxMlYvEZ/qKTEdoCeaXv2QEmN6dVqjDoTAo
k0t5u4YRXzEVCfXAC3ocplNdtCA72wjFJcSbfif4BSC8bDACTXtnPC7nD0VndZLp
+RiNLeiENhk0oTC+UVdSc+n2nJOzkCK0vYu0Ads4JGIB7g8IB3z2t9ICmsWrgnhd
NdcOe15BincrGA8avQ1cWXsfIKEjbrnEuEk9b5jel6NfHtPKoHc9mDpRdNPISeVa
wDBM1mJChneHt59Nh8Gah74+TM1jBsw4fhJPvoc7Atcg740JErb904mZfkIEmojC
VPhBHVQ9LHBAdM8qFI2kRK0IynOmAZhexlP/aT/kpEsEPyaZQlnBn3An1CRz8h0S
PApL8PytggYKeQmRhl499+6jLxcZ2IegLfqq41dzIjwHwTMplg+1pKIOVojpWA==
-----END CERTIFICATE-----
</ca>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
e685bdaf659a25a200e2b9e39e51ff03
0fc72cf1ce07232bd8b2be5e6c670143
f51e937e670eee09d4f2ea5a6e4e6996
5db852c275351b86fc4ca892d78ae002
d6f70d029bd79c4d1c26cf14e9588033
cf639f8a74809f29f72b9d58f9b8f5fe
fc7938eade40e9fed6cb92184abb2cc1
0eb1a296df243b251df0643d53724cdb
5a92a1d6cb817804c4a9319b57d53be5
80815bcfcb2df55018cc83fc43bc7ff8
2d51f9b88364776ee9d12fc85cc7ea5b
9741c4f598c485316db066d52db4540e
212e1518a9bd4828219e24b20d88f598
a196c9de96012090e333519ae18d3509
9427e7b372d348d352dc4c85e18cd4b9
3f8a56ddb2e64eb67adfc9b337157ff4
-----END OpenVPN Static key V1-----
</tls-auth>


Trying to figure this one out -- is this router behind another router with an address of 192.168.1.1?

The fact that this is showing dev [NULL] is odd. If you change your configuration to dev tun0, that may fix the issue. Please try that.

Also, the OpenVPN file you provided has all of the cryptographic keys included. If this is a publicly available file from Nord, that is fine. But if this is individualized for you, you should redact the keys.

Thanks.
192.168.8.1 is this router ip.
192.168.1.1 is the next router, yes.
I am connecting to the wifi that 192.168.1.1 provides.

The config file is public from nordvpn. You suggest to change it?

Since it is public, the file can remain here without issue (I was concerned about private information being shared accidentally). However, I am suggesting that you change dev tun to dev tun0

I did it. Unfortunately it didn't work

Here is the log


BusyBox v1.30.1 () built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 19.07.7, r11306-c4a6851c72
 -----------------------------------------------------
root@GL-AR750S:~# logread -e openvpn
Thu Dec 23 01:39:27 2021 daemon.notice procd: /etc/rc.d/S90vpn-service: cat: can't open '/etc/openvpn/ovpn/server.ovpn': No such file or directory
Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4094]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4094]: OpenVPN 2.5.0 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4094]: library versions: OpenSSL 1.1.1i  8 Dec 2020Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4226]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4226]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: TCP/UDP: Preserving recently used remote address: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: UDP link local: (not bound)
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: UDP link remote: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: TLS: Initial packet from [AF_INET]81.19.217.3:1194, sid=85fc1f24 8b916d1d
Thu Dec 23 01:40:46 2021 daemon.warn openvpn[4226]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY KU OK
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Validating certificate extended key usage
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY EKU OK
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: VERIFY OK: depth=0, CN=uk877.nordvpn.com
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Dec 23 01:40:46 2021 daemon.notice openvpn[4226]: [uk877.nordvpn.com] Peer Connection Initiated with [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: SENT CONTROL [uk877.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.254.61 255.255.0.0,peer-id 3,cipher AES-256-GCM'
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: compression parms modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: route options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: route-related options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: peer-id set
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan-sta
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: TUN/TAP device tun0 opened
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_iface_mtu_set: mtu 1500 for tun0
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_iface_up: set tun0 up
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: net_addr_v4_add: 10.8.254.61/16 dev tun0
Thu Dec 23 01:40:47 2021 daemon.notice openvpn[4226]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.254.61 255.255.0.0 init
Thu Dec 23 01:40:50 2021 daemon.notice openvpn[4226]: net_route_v4_add: 81.19.217.3/32 via 192.168.1.1 dev [NULL] table 0 metric -1
Thu Dec 23 01:40:50 2021 daemon.notice openvpn[4226]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 01:40:50 2021 daemon.notice openvpn[4226]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4852]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4852]: OpenVPN 2.5.0 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4852]: library versions: OpenSSL 1.1.1i  8 Dec 2020Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4887]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4887]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: TCP/UDP: Preserving recently used remote address: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: UDP link local: (not bound)
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: UDP link remote: [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: TLS: Initial packet from [AF_INET]81.19.217.3:1194, sid=c143125f 91e5031c
Thu Dec 23 01:40:53 2021 daemon.warn openvpn[4887]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY KU OK
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Validating certificate extended key usage
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY EKU OK
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: VERIFY OK: depth=0, CN=uk877.nordvpn.com
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
Thu Dec 23 01:40:53 2021 daemon.notice openvpn[4887]: [uk877.nordvpn.com] Peer Connection Initiated with [AF_INET]81.19.217.3:1194
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: SENT CONTROL [uk877.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.254.61 255.255.0.0,peer-id 9,cipher AES-256-GCM'
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: compression parms modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: route options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: route-related options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: peer-id set
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: OPTIONS IMPORT: data channel crypto options modified
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: net_route_v4_best_gw result: via 192.168.1.1 dev wlan-sta
Thu Dec 23 01:40:54 2021 daemon.err openvpn[4887]: ERROR: Cannot ioctl TUNSETIFF tun0: Resource busy (errno=16)
Thu Dec 23 01:40:54 2021 daemon.notice openvpn[4887]: Exiting due to fatal error
Thu Dec 23 01:41:01 2021 daemon.notice openvpn[4226]: Initialization Sequence Completed
root@GL-AR750S:~#

clearly that didn't work. Sorry. Let's set that back to just dev tun

Then, once you have started the tunnel, what do you see on the output of the following things:
ifconfig

route

ping 8.8.8.8

If 192.168.1.1 is the gateway and 192.168.8.1 is the vpn, maybe the problem is that when 8.1 is rebooted the connection between the two isn't made in time so the tun can't be created and exits?

Pay attention that the error you mentioned appeared before as well.

This is after I reconnect to vpn:

root@GL-AR750S:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          inet addr:192.168.8.1  Bcast:192.168.8.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1816 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1160 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:294322 (287.4 KiB)  TX bytes:278708 (272.1 KiB)

eth0      Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          inet6 addr: fe80::9683:c4ff:fe0c:d0cd/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:262 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:55896 (54.5 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:129 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:14858 (14.5 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:111 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:37962 (37.0 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:18 errors:0 dropped:0 overruns:0 frame:0
          TX packets:18 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:1312 (1.2 KiB)  TX bytes:1312 (1.2 KiB)

tun0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          inet addr:10.8.254.61  P-t-P:10.8.254.61  Mask:255.255.0.0
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:59 errors:0 dropped:0 overruns:0 frame:0
          TX packets:61 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:500
          RX bytes:17633 (17.2 KiB)  TX bytes:7216 (7.0 KiB)

wlan-sta  Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          inet addr:192.168.1.33  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1882 errors:0 dropped:6 overruns:0 frame:0
          TX packets:1302 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:316854 (309.4 KiB)  TX bytes:249612 (243.7 KiB)

wlan0     Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CE
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:1816 errors:0 dropped:0 overruns:0 frame:0
          TX packets:1285 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:319838 (312.3 KiB)  TX bytes:318909 (311.4 KiB)

root@GL-AR750S:~# route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
default         10.8.0.1        128.0.0.0       UG    0      0        0 tun0
default         192.168.1.1     0.0.0.0         UG    20     0        0 wlan-sta
10.8.0.0        *               255.255.0.0     U     0      0        0 tun0
81.19.217.3     192.168.1.1     255.255.255.255 UGH   0      0        0 wlan-sta
128.0.0.0       10.8.0.1        128.0.0.0       UG    0      0        0 tun0
192.168.1.0     *               255.255.255.0   U     20     0        0 wlan-sta
192.168.8.0     *               255.255.255.0   U     0      0        0 br-lan
root@GL-AR750S:~# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
64 bytes from 8.8.8.8: seq=0 ttl=60 time=34.259 ms
64 bytes from 8.8.8.8: seq=1 ttl=60 time=34.570 ms
64 bytes from 8.8.8.8: seq=2 ttl=60 time=33.858 ms
64 bytes from 8.8.8.8: seq=3 ttl=60 time=33.661 ms
64 bytes from 8.8.8.8: seq=4 ttl=60 time=34.203 ms
64 bytes from 8.8.8.8: seq=5 ttl=60 time=34.427 ms
64 bytes from 8.8.8.8: seq=6 ttl=60 time=34.106 ms
64 bytes from 8.8.8.8: seq=7 ttl=60 time=34.228 ms
64 bytes from 8.8.8.8: seq=8 ttl=60 time=36.931 ms
64 bytes from 8.8.8.8: seq=9 ttl=60 time=34.606 ms
^Z[2]+  Stopped                    ping 8.8.8.8

This suggests that internet connectivity is working -- hopefully through the tunnel. It is possible the problem is actually related to DNS.

Let's try this:

  • test pings to 8.8.8.8 again.
  • then test pings to google.com
  • Test traceroute to 8.8.8.8
  • and then traceroute to google.com

No problem, but keep in mind that it is not after reboot. It was after reconnecting to vpn.

After reboot i had this:

root@GL-AR750S:~# ifconfig
br-lan    Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          inet addr:192.168.8.1  Bcast:192.168.8.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:390 errors:0 dropped:0 overruns:0 frame:0
          TX packets:107 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:32919 (32.1 KiB)  TX bytes:13341 (13.0 KiB)

eth0      Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          inet6 addr: fe80::9683:c4ff:fe0c:d0cd/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:172 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:30872 (30.1 KiB)
          Interrupt:4

eth0.1    Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:105 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:12766 (12.4 KiB)

eth0.2    Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:45 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:15390 (15.0 KiB)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:18 errors:0 dropped:0 overruns:0 frame:0
          TX packets:18 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:1312 (1.2 KiB)  TX bytes:1312 (1.2 KiB)

tun0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          inet addr:10.8.254.61  P-t-P:10.8.254.61  Mask:255.255.0.0
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:3 errors:0 dropped:0 overruns:0 frame:0
          TX packets:216 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:500
          RX bytes:156 (156.0 B)  TX bytes:13988 (13.6 KiB)

wlan-sta  Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CD
          inet addr:192.168.1.33  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:590 errors:0 dropped:2 overruns:0 frame:0
          TX packets:373 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:49963 (48.7 KiB)  TX bytes:59854 (58.4 KiB)

wlan0     Link encap:Ethernet  HWaddr 94:83:C4:0C:D0:CE
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:388 errors:0 dropped:0 overruns:0 frame:0
          TX packets:208 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:38339 (37.4 KiB)  TX bytes:29958 (29.2 KiB)

root@GL-AR750S:~# route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
default         10.8.0.1        128.0.0.0       UG    0      0        0 tun0
default         192.168.1.1     0.0.0.0         UG    20     0        0 wlan-sta
10.8.0.0        *               255.255.0.0     U     0      0        0 tun0
81.19.217.3     192.168.1.1     255.255.255.255 UGH   0      0        0 wlan-sta
128.0.0.0       10.8.0.1        128.0.0.0       UG    0      0        0 tun0
192.168.1.0     *               255.255.255.0   U     20     0        0 wlan-sta
192.168.8.0     *               255.255.255.0   U     0      0        0 br-lan
root@GL-AR750S:~# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 56 data bytes
^Z[1]+  Stopped                    ping 8.8.8.8

So, is the issue that you can your internet connectivity fails after a reboot (and auto-start of the VPN), but you are able to get internet connectivity if you stop the VPN and then reconnect?

Yes, exactly.

Doh....

I can't believe I missed/forgot about this...
Yeah, the solution may be fairly simple. This is most likely an issue of time. Specifically, there is no real time clock (RTC) to keep persistent time on most routers. This means that when you restart the router, the current time gets cleared and the time must sync with an NTP server. IIRC, OpenWrt does set the time to the value of the most recently written file, thus making it not-as-far-off as if it just didn't have any time reference at all (think the beginning of the unix epoch - Jan 1, 1970, midnight UTC). Here is a thread discussing the time issues.

Anyway, I think that OpenVPN will not connect properly if the time isn't right. I know this to be true for Wireguard, but I think it matters for OpenVPN as well, although the time tolerance may be bigger.

I'd recommend trying to either delay the OpenVPN initialization until after NTP has successfully sync'd, or to bounce it after the NTP sync. This thread deals with the issue for Wireguard, as an example.

If the OpenVPN init upon reboot results in the router itself not having connectivity, the router obviously won't be able to sync time until you stop OpenVPN. However, if the time can sync properly, you can just restart the tunnel.

There are probably a bunch of ways to test this theory (do these individually, not combined)...

  • add a delay (maybe 10-60 seconds) in the OpenWrt init sequence
  • push OpenVPN's init sequence number to 99, with the hopes that the time has sync'd by the time OpenVPN is started (this is not guaranteed to work, though)
  • disable the OpenVPN service on boot and then use the hot plug scripts described in the WG thread to start OpenVPN when NTP has sync'd
  • leave OpenVPN enabled on-boot, add the hot plug script to restart OpenVPN after NTP success.

Whichever of these options seems resonate with you as a reasonable solution is probably worth trying.... try other options if it doesn't resolve the issue.

Wow, thanks.
I will try it.

Where can i find how to add a delay and where can i find this script?

/etc/init.d/openvpn

You will see a start function. adding a delay at the beginning of the start function would be a method to try.

sleep 30 in that script would cause that function to wait 30 seconds before continuing.

alternatively, you could use the hotplug scripts described in the wireguard link. There, you would start or restart the OpenVPN process
/etc/init.d/openvpn start
Or
/etc/init.d/openvpn restart

added sleep to start_service method (there is no start, only start instance and start service. start service calling start instance), it didn't work. I would try the scripts.