Can someone help? I don’t know what happens but every so often I get disconnected from my connected server (while actively using it, and it take literally 10 MINUTES for it to come back. Here are the relevant logs
I’m using Ethernet and not Wifi.
Connection is down at 20:56:59 and back at 21:06:23
At 21:06:11 I get [br53.nordvpn.com] Inactivity timeout (--ping-restart), restarting
but this is way after connection is down.
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: VERIFY OK: depth=1, O=NordVPN, CN=NordVPN CA8
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: VERIFY KU OK
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: Validating certificate extended key usage
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: VERIFY EKU OK
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: VERIFY X509NAME OK: CN=br53.nordvpn.com
Wed May 3 20:56:59 2023 daemon.notice openvpn[16161]: VERIFY OK: depth=0, CN=br53.nordvpn.com
Wed May 3 20:57:00 2023 daemon.notice openvpn[16161]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed May 3 20:57:00 2023 daemon.notice openvpn[16161]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed May 3 20:57:00 2023 daemon.notice openvpn[16161]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: [br53.nordvpn.com] Inactivity timeout (--ping-restart), restarting
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: net_route_v4_del: 177.54.151.174/32 via 192.168.188.1 dev [NULL] table 0 metric -1
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: net_route_v4_del: 0.0.0.0/1 via 10.8.2.1 dev [NULL] table 0 metric -1
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: net_route_v4_del: 128.0.0.0/1 via 10.8.2.1 dev [NULL] table 0 metric -1
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: Closing TUN/TAP interface
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: net_addr_v4_del: 10.8.2.10 dev tun0
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.2.10 255.255.255.0 init
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: SIGHUP[soft,ping-restart] received, process restarting
Wed May 3 21:06:11 2023 daemon.warn openvpn[16161]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: OpenVPN 2.5.2 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: library versions: OpenSSL 1.1.1n 15 Mar 2022
Wed May 3 21:06:11 2023 daemon.notice openvpn[16161]: Restart pause, 5 second(s)
Wed May 3 21:06:11 2023 daemon.info dnsmasq[28226]: exiting on receipt of SIGTERM
Wed May 3 21:06:11 2023 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed May 3 21:06:12 2023 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: started, version 2.80 cachesize 150
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: DNS service limited to local subnets
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth nettlehash DNSSEC no-ID loop-detect inotify dumpfile
Wed May 3 21:06:12 2023 daemon.info dnsmasq-dhcp[23580]: DHCP, IP range 192.168.8.100 -- 192.168.8.249, lease time 12h
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain test
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain onion
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain localhost
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain local
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain invalid
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain bind
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain lan
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: reading /tmp/resolv.conf.auto
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain test
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain onion
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain localhost
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain local
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain invalid
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain bind
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using local addresses only for domain lan
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: using nameserver 192.168.188.1#53
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: read /etc/hosts - 4 addresses
Wed May 3 21:06:12 2023 daemon.info dnsmasq[23580]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Wed May 3 21:06:12 2023 daemon.info dnsmasq-dhcp[23580]: read /etc/ethers - 0 addresses
Wed May 3 21:06:16 2023 daemon.warn openvpn[16161]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Wed May 3 21:06:16 2023 daemon.warn openvpn[16161]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: TCP/UDP: Preserving recently used remote address: [AF_INET]177.54.151.174:1194
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: UDP link local: (not bound)
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: UDP link remote: [AF_INET]177.54.151.174:1194
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: TLS: Initial packet from [AF_INET]177.54.151.174:1194, sid=d06cde30 b91278a9
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: VERIFY OK: depth=1, O=NordVPN, CN=NordVPN CA8
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: VERIFY KU OK
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: Validating certificate extended key usage
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: VERIFY EKU OK
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: VERIFY X509NAME OK: CN=br53.nordvpn.com
Wed May 3 21:06:16 2023 daemon.notice openvpn[16161]: VERIFY OK: depth=0, CN=br53.nordvpn.com
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: [br53.nordvpn.com] Peer Connection Initiated with [AF_INET]177.54.151.174:1194
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.1.6 255.255.255.0,peer-id 3,cipher AES-256-GCM'
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: timers and/or timeouts modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: explicit notify parm(s) modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: compression parms modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: --ifconfig/up options modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: route options modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: route-related options modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: peer-id set
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: adjusting link_mtu to 1657
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: OPTIONS IMPORT: data channel crypto options modified
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: Data Channel: using negotiated cipher 'AES-256-GCM'
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: net_route_v4_best_gw query: dst 0.0.0.0
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: net_route_v4_best_gw result: via 192.168.188.1 dev eth0.2
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: TUN/TAP device tun0 opened
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: net_iface_mtu_set: mtu 1500 for tun0
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: net_iface_up: set tun0 up
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: net_addr_v4_add: 10.8.1.6/24 dev tun0
Wed May 3 21:06:17 2023 daemon.notice openvpn[16161]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.1.6 255.255.255.0 init
Wed May 3 21:06:17 2023 daemon.info dnsmasq[23580]: exiting on receipt of SIGTERM
Wed May 3 21:06:18 2023 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Wed May 3 21:06:18 2023 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: started, version 2.80 cachesize 150
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: DNS service limited to local subnets
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth nettlehash DNSSEC no-ID loop-detect inotify dumpfile
Wed May 3 21:06:19 2023 daemon.info dnsmasq-dhcp[23867]: DHCP, IP range 192.168.8.100 -- 192.168.8.249, lease time 12h
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain test
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain onion
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain localhost
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain local
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain invalid
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain bind
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain lan
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: reading /tmp/resolv.conf.vpn
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain test
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain onion
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain localhost
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain local
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain invalid
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain bind
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using local addresses only for domain lan
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using nameserver 103.86.96.100#53
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: using nameserver 103.86.99.100#53
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: read /etc/hosts - 4 addresses
Wed May 3 21:06:19 2023 daemon.info dnsmasq[23867]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Wed May 3 21:06:19 2023 daemon.info dnsmasq-dhcp[23867]: read /etc/ethers - 0 addresses
Wed May 3 21:06:19 2023 daemon.notice openvpn[16161]: net_route_v4_add: 177.54.151.174/32 via 192.168.188.1 dev [NULL] table 0 metric -1
Wed May 3 21:06:19 2023 daemon.notice openvpn[16161]: net_route_v4_add: 0.0.0.0/1 via 10.8.1.1 dev [NULL] table 0 metric -1
Wed May 3 21:06:19 2023 daemon.notice openvpn[16161]: net_route_v4_add: 128.0.0.0/1 via 10.8.1.1 dev [NULL] table 0 metric -1
Wed May 3 21:06:20 2023 user.info mwan3rtmon[2470]: Detect rtchange event.
Wed May 3 21:06:21 2023 user.notice firewall: Reloading firewall due to ifup of ovpn (tun0)
Wed May 3 21:06:23 2023 user.notice root: check route success
Wed May 3 21:06:23 2023 daemon.notice openvpn[16161]: Initialization Sequence Completed
Thank you,
Cheers!