CyberGhost OpenVPN client restarts every ~2 minutes

Following issue with a Flint router with firmware 4.4.6 and using a OpenVPN connection to VPN provider CyberGhost. Had created a Login/config for OpenVPN in my CyberGhost web portal and copied the zip file into the Flint router. The issue now is, the connection restarts every ~2 minutes periodically/indefinitely.

I cant see the cause in the log file through the GLinet web interface, because the log doesnt survive the restarts (this should be changed too btw I guess in a newer firmware, what sense does the log make, if its cleared with a restart/issue), the log is always totally reset/recreated every 2-3 minutes because the OpenVPN connections restarts.

The log just shows this, but it is not useful because it doesnt show the disconnect fault and then resets for the restart:

Tue Jan 9 05:23:18 2024 daemon.info avahi-daemon[4649]: New relevant interface ovpnclient.IPv4 for mDNS.
Tue Jan 9 05:23:18 2024 daemon.info avahi-daemon[4649]: Registering new address record for 10.7.5.35 on ovpnclient.IPv4.
Tue Jan 9 05:23:18 2024 daemon.notice ovpnclient[10026]: /etc/openvpn/scripts/ovpnclient-up ovpnclient 4 ovpnclient 1500 1626 10.7.5.35 255.255.255.0 init
Tue Jan 9 05:23:18 2024 user.notice ovpnclient-up: env value:route_vpn_gateway=10.7.5.1 daemon_log_redirect=0 X509_1_emailAddress=info@cyberghost.ro script_type=up proto_1=tcp-client daemon=0 SHLVL=1 foreign_option_1=dhcp-option DNS 10.0.0.243 dev_type=tun remote_1=97-1-de.cg-dialup.net dev=ovpnclient X509_0_CN=berlin-rack453.nodes.gen4.ninja remote_port_1=443 X509_1_CN=CyberGhost Root CA X509_1_C=RO ifconfig_netmask=255.255.255.0 tls_digest_sha256_0=REMOVED daemon_start_time=1704774198 script_context=init ifconfig_local=10.7.5.35 common_name=berlin-rack453.nodes.gen4.ninja tls_digest_sha256_1=REMOVED verb=4 X509_1_L=Bucharest link_mtu=1626 trusted_ip=193.176.86.57 tls_serial_hex_0=REMOVED X509_1_O=CyberGhost S.A. tun_mtu=1500 route_ipv6_network_1=2000::/3 tls_serial_hex_1=REMOVED tru
Tue Jan 9 05:23:18 2024 daemon.notice netifd: ovpnclient (10026): sh: 1: unknown operand
Tue Jan 9 05:23:19 2024 daemon.info avahi-daemon[4649]: Interface ovpnclient.IPv4 no longer relevant for mDNS.
Tue Jan 9 05:23:19 2024 daemon.info avahi-daemon[4649]: Leaving mDNS multicast group on interface ovpnclient.IPv4 with address 10.7.5.35.
Tue Jan 9 05:23:19 2024 daemon.info avahi-daemon[4649]: Withdrawing address record for 10.7.5.35 on ovpnclient.
Tue Jan 9 05:23:19 2024 daemon.info avahi-daemon[4649]: Joining mDNS multicast group on interface ovpnclient.IPv4 with address 10.7.5.35.
Tue Jan 9 05:23:19 2024 daemon.info avahi-daemon[4649]: New relevant interface ovpnclient.IPv4 for mDNS.
Tue Jan 9 05:23:19 2024 daemon.info avahi-daemon[4649]: Registering new address record for 10.7.5.35 on ovpnclient.IPv4.
Tue Jan 9 05:23:19 2024 daemon.notice netifd: Interface ‘ovpnclient’ is now up
Tue Jan 9 05:23:19 2024 daemon.notice netifd: Network device ‘ovpnclient’ link is up
Tue Jan 9 05:23:19 2024 kern.info kernel: [48537.452408] IPv6: ADDRCONF(NETDEV_UP): ovpnclient: link is not ready
Tue Jan 9 05:23:19 2024 daemon.notice netifd: ovpnclient (10026): RTNETLINK answers: File exists
Tue Jan 9 05:23:19 2024 user.notice mwan3[10431]: Execute ifup event on interface ovpnclient (ovpnclient)
Tue Jan 9 05:23:19 2024 user.notice mwan3[10431]: Starting tracker on interface ovpnclient (ovpnclient)
Tue Jan 9 05:23:22 2024 user.notice firewall: Reloading firewall due to ifup of ovpnclient (ovpnclient)
Tue Jan 9 05:23:24 2024 daemon.warn ovpnclient[10026]: WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Tue Jan 9 05:23:24 2024 daemon.notice ovpnclient[10026]: Initialization Sequence Completed

I have tested severel server locations so far, all have the same issue, using TCP for better stability / error correction.

The config file is the following provided by CyberGhost:

client
remote 97-1-de.cg-dialup.net 443
dev tun
proto tcp
auth-user-pass /etc/openvpn/profiles/99962/auth/username_password.txt
resolv-retry infinite
redirect-gateway def1
persist-key
persist-tun
nobind
cipher AES-256-CBC
ncp-disable
auth SHA256
ping 5
ping-exit 60
ping-timer-rem
script-security 2
remote-cert-tls server
route-delay 5
verb 4
ca “/etc/openvpn/profiles/99962/cert/202311204909-ca.crt”
cert “/etc/openvpn/profiles/99962/cert/202311204909-client.crt”
key “/etc/openvpn/profiles/99962/cert/202311204909-client.key”
daemon

I dont have this issue with NordVPN, which provides a slightly different config:

client
dev tun
proto udp
remote 195.181.170.204 1194
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo no
verify-x509-name CN=de799.nordvpn.com
remote-cert-tls server
auth-user-pass /etc/openvpn/profiles/61519/auth/username_password.txt
verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512
key-direction 1
daemon

I have looked on ssh shell through logread and found this:

Tue Jan 9 08:12:30 2024 daemon.notice ovpnclient[17375]: [frankfurt-rack487.nodes.gen4.ninja] Inactivity timeout (–ping-exit), exiting
Tue Jan 9 08:12:30 2024 daemon.notice ovpnclient[17375]: TCP/UDP: Closing socket
Tue Jan 9 08:12:30 2024 daemon.notice ovpnclient[17375]: Closing TUN/TAP interface

This seems to be repeated every 2 minutes and OpenVPN client closes and restarts.

I also notices this, is this normal?

Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘wgserver’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Populating IPv6 nat table
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_lan_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_lan_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_wan_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_wan_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_guest_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_guest_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_ovpnclient_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_ovpnclient_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_wgserver_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_wgserver_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_rule’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘lan’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘wan’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘guest’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘ovpnclient’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘wgserver’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Populating IPv6 mangle table
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Rule ‘process_mark’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Rule ‘wan_in_conn_mark’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Rule ‘lan_in_conn_mark_restore’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Rule ‘out_conn_mark_restore’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Rule ‘safe_mode_mark’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Rule ‘safe_mode_mark_save’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘lan’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘wan’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘guest’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘ovpnclient’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Zone ‘wgserver’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Flushing conntrack: 10.10.5.74
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Set tcp_ecn to off
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Set tcp_syncookies to on
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Set tcp_window_scaling to on
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Running script ‘/etc/firewall.nat6’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Running script ‘/etc/firewall.swap_wan_in_conn_mark.sh’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): sed: write error
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): ! Failed with exit code 4
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Running script ‘/etc/firewall.vpn_server_policy.sh’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Running script ‘/var/etc/gls2s.include’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): ! Skipping due to path error: No such file or directory
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): * Running script ‘/usr/bin/gl_block.sh’
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Failed to parse json data: unexpected character
Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): uci: Entry not found

Please try:

Have you enabled ipv6?

1 Like

No, I am using only Ipv4.

It seems changing ping-exit 30 to ping-restart 30 has fixed it, so far the connection doesnt restart anymore it seems.

1 Like

Great! we’ll optimize the vpn log part soon, it’s quite messed up and misleading.

1 Like

@hansome Can you maybe tell something about the other log entries I showed above, it seems to contain some errors like:

Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Failed to parse json data: unexpected character

It seems some json config file is broken?

Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): uci: Entry not found

that doesnt sound right. Or also the firewall reloading warnings.

Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?

and

Tue Jan 9 08:12:31 2024 daemon.notice netifd: ovpnclient (21288): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_rule’

Some of these seem to be errors for example the parse error, or not properly using iptables -w command.

Also is there anything else I should maybe change in the above config by Cyberghost so it is more compatible or performing better?

My test didn’t report logs like that.
Would you please send me a configuration backup by private message for analysis?
http://192.168.8.1/cgi-bin/luci/admin/system/flash

Have you installed any packages manually?

@hansome these errors are generated when you stop a running/open openvpn client connection from the web gui via the stop button.

Tue Jan 9 18:00:56 2024 user.notice mwan3[4621]: Execute ifdown event on interface ovpnclient (unknown)
Tue Jan 9 18:00:57 2024 kern.info kernel: [18253.559571] xt_CT: No such helper “rtsp”
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @defaults[0] requires unavailable target extension FLOWOFFLOAD, disabling
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @zone[1] (wan) cannot resolve device of network ‘wan6’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @zone[1] (wan) cannot resolve device of network ‘wwan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @zone[2] (guest) cannot resolve device of network ‘guest’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Option ‘ovpnclient’.masq6 is unknown
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Option ‘wgserver’.client_to_client is unknown
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Option ‘wgserver’.masq6 is unknown
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘block_dns’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘safe_mode_mark’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘safe_mode_mark_save’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘safe_mode_mark_drop’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Option ‘sambasharewan’.dest_proto is unknown
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘sambasharewan’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Option ‘sambasharelan’.dest_proto is unknown
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘sambasharelan’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Option ‘glnas_ser’.dest_proto is unknown
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘glnas_ser’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Option ‘webdav_wan’.dest_proto is unknown
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section ‘webdav_wan’ does not specify a protocol, assuming TCP+UDP
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @redirect[0] (GL-cam1_rtsp) has no target specified, defaulting to DNAT
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @redirect[1] (GL-cam2_rtsp) has no target specified, defaulting to DNAT
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @defaults[0] requires unavailable target extension FLOWOFFLOAD, disabling
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: Section @zone[2] (guest) has no device, network, subnet or extra options
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Clearing IPv4 filter table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Clearing IPv4 nat table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Clearing IPv4 mangle table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Clearing IPv4 raw table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Populating IPv4 filter table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-DHCP-Renew’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-IGMP’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-IPSec-ESP’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-ISAKMP’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘118 allow firetv’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘block_dns’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-DHCP’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-DNS’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_lan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_guest’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_mark_drop’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule #18
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule #19
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule #20
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule #21
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘wgserver_allow’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Redirect ‘GL-cam1_rtsp’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Redirect ‘GL-cam2_rtsp’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Forward ‘wgserver’ → ‘wan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Forward ‘lan’ → ‘wgserver’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Forward ‘wgserver’ → ‘lan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘lan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘guest’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wgserver’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Populating IPv4 nat table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Redirect ‘GL-cam1_rtsp’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Redirect ‘GL-cam2_rtsp’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘lan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘guest’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wgserver’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Populating IPv4 mangle table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘process_mark’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_mark’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_mark_save’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘lan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘guest’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wgserver’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Populating IPv4 raw table
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Redirect ‘GL-cam1_rtsp’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): - Auto-selected conntrack helper ‘rtsp’ based on proto/port
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Redirect ‘GL-cam2_rtsp’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): - Auto-selected conntrack helper ‘rtsp’ based on proto/port
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘lan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): - Using automatic conntrack helper attachment
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wan’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘guest’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): - Using automatic conntrack helper attachment
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wgserver’
Tue Jan 9 18:00:57 2024 daemon.notice netifd: ovpnclient (4622): Warning: iptc_commit(): No chain/target/match by that name
Tue Jan 9 18:00:57 2024 kern.info kernel: [18254.449291] xt_CT: No such helper “rtsp”
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Clearing IPv6 filter table
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Clearing IPv6 nat table
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Clearing IPv6 mangle table
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Populating IPv6 filter table
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-DHCPv6’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-MLD’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-ICMPv6-Input’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-ICMPv6-Forward’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-IPSec-ESP’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-ISAKMP’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘block_dns’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-DHCP’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘Allow-DNS’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_lan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_guest’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_mark_drop’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule #18
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule #19
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule #20
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule #21
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Forward ‘wgserver’ → ‘wan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Forward ‘lan’ → ‘wgserver’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Forward ‘wgserver’ → ‘lan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘lan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘guest’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wgserver’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Populating IPv6 nat table
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_lan_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_lan_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_wan_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_wan_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_guest_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_guest_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_wgserver_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_wgserver_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘prerouting_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Warning: fw3_ipt_rule_append(): Can’t find target ‘postrouting_rule’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘lan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘guest’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wgserver’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Populating IPv6 mangle table
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘process_mark’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_mark’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Rule ‘safe_mode_mark_save’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘lan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wan’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘guest’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Zone ‘wgserver’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Set tcp_ecn to off
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Set tcp_syncookies to on
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Set tcp_window_scaling to on
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Running script ‘/etc/firewall.nat6’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Running script ‘/etc/firewall.vpn_server_policy.sh’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Another app is currently holding the xtables lock. Perhaps you want to use the -w option?
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Running script ‘/var/etc/gls2s.include’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): ! Skipping due to path error: No such file or directory
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): * Running script ‘/usr/bin/gl_block.sh’
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): Failed to parse json data: unexpected character
Tue Jan 9 18:00:58 2024 daemon.notice netifd: ovpnclient (4622): uci: Entry not found
Tue Jan 9 18:00:58 2024 daemon.info dnsmasq[2379]: exiting on receipt of SIGTERM