GL-AXT1800 Slate AX, Firmware 4.5
I recently bought the router and have been trying to set up the NordVPN connection through the OpenVPN auto setup wizard.
I provided my credentials, got the list of servers, and attempted to initiate a connection but the VPN session never gets established. Here is the log, which seems to repeat the same output over and over.
I see various parsing errors and missing scripts.
Thu Mar 28 08:04:27 2024 daemon.warn ovpnclient[6721]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Mar 28 08:04:27 2024 daemon.warn ovpnclient[6721]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: Outgoing Control Channel Authentication: Using 512 bit message hash âSHA512â for HMAC authentication
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: Incoming Control Channel Authentication: Using 512 bit message hash âSHA512â for HMAC authentication
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.100.27:1194
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: UDP link local: (not bound)
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: UDP link remote: [AF_INET]146.70.100.27:1194
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: TLS: Initial packet from [AF_INET]146.70.100.27:1194, sid=325f33c8 dc3360d6
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: VERIFY OK: depth=1, O=NordVPN, CN=NordVPN CA9
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: VERIFY KU OK
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: Validating certificate extended key usage
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: VERIFY EKU OK
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: VERIFY X509NAME OK: CN=us9594.nordvpn.com
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: VERIFY OK: depth=0, CN=us9594.nordvpn.com
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Thu Mar 28 08:04:27 2024 daemon.notice ovpnclient[6721]: [us9594.nordvpn.com] Peer Connection Initiated with [AF_INET]146.70.100.27:1194
Thu Mar 28 08:04:28 2024 daemon.notice ovpnclient[6721]: SENT CONTROL [us9594.nordvpn.com]: âPUSH_REQUESTâ (status=1)
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): Warning: fw3_ipt_rule_append(): Canât find match âconnmarkâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Rule âout_conn_mark_restoreâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): Warning: fw3_ipt_rule_append(): Canât find match âconnmarkâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): Warning: fw3_ipt_rule_append(): Canât find match âconnmarkâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Zone âlanâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Zone âwanâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Zone âguestâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Zone âovpnclientâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Set tcp_ecn to off
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Set tcp_syncookies to on
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Set tcp_window_scaling to on
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Running script â/etc/firewall.nat6â
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Running script â/etc/firewall.swap_wan_in_conn_mark.shâ
Thu Mar 28 08:04:40 2024 daemon.notice netifd: ovpnclient (7026): * Running script â/etc/firewall.vpn_server_policy.shâ
Thu Mar 28 08:04:41 2024 daemon.notice netifd: ovpnclient (7026): * Running script â/var/etc/gls2s.includeâ
Thu Mar 28 08:04:41 2024 daemon.notice netifd: ovpnclient (7026): ! Skipping due to path error: No such file or directory
Thu Mar 28 08:04:41 2024 daemon.notice netifd: ovpnclient (7026): * Running script â/usr/bin/gl_block.shâ
Thu Mar 28 08:04:41 2024 daemon.notice netifd: ovpnclient (7026): Failed to parse json data: unexpected character
Thu Mar 28 08:04:41 2024 daemon.notice netifd: ovpnclient (7026): uci: Entry not found
Thu Mar 28 08:04:41 2024 daemon.notice netifd: ovpnclient (7026): cat: canât open â/tmp/run/ovpn_resolved_ipâ: No such file or directory
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10
Thu Mar 28 08:04:52 2024 daemon.warn ovpnclient[7434]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Mar 28 08:04:52 2024 daemon.warn ovpnclient[7434]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: Outgoing Control Channel Authentication: Using 512 bit message hash âSHA512â for HMAC authentication
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: Incoming Control Channel Authentication: Using 512 bit message hash âSHA512â for HMAC authentication
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.100.27:1194
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: UDP link local: (not bound)
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: UDP link remote: [AF_INET]146.70.100.27:1194
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: TLS: Initial packet from [AF_INET]146.70.100.27:1194, sid=c7eb88ad 87613304
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: VERIFY OK: depth=1, O=NordVPN, CN=NordVPN CA9
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: VERIFY KU OK
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: Validating certificate extended key usage
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: VERIFY EKU OK
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: VERIFY X509NAME OK: CN=us9594.nordvpn.com
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: VERIFY OK: depth=0, CN=us9594.nordvpn.com
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Thu Mar 28 08:04:52 2024 daemon.notice ovpnclient[7434]: [us9594.nordvpn.com] Peer Connection Initiated with [AF_INET]146.70.100.27:1194