GL-MT300N-V2 vpn disconnection

Hi to all,
I bought this mini router some days ago and I found a boring problem using nordvpn. Often when I try to access to the internet I discover that the connection is lost. All the times I have to set the connection to the vpn manually but after about one day the connection lost again.
Is there anyone who knows if this problem can solve?
Thx in advance.

You can try out the latest test firmware

I installed the firmware suggest by you but without positive resolution. I tryed also to add the script about reconnection but the result is the same.
I attach the log file

LOG:
Wed Jun 10 23:59:46 2020 daemon.notice openvpn[12948]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Jun 10 23:59:46 2020 daemon.notice openvpn[12948]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
Wed Jun 10 23:59:46 2020 daemon.notice openvpn[12948]: VERIFY KU OK
Wed Jun 10 23:59:46 2020 daemon.notice openvpn[12948]: Validating certificate extended key usage
Wed Jun 10 23:59:46 2020 daemon.notice openvpn[12948]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Jun 10 23:59:46 2020 daemon.notice openvpn[12948]: VERIFY EKU OK
Wed Jun 10 23:59:46 2020 daemon.notice openvpn[12948]: VERIFY OK: depth=0, CN=hu44.nordvpn.com
Wed Jun 10 23:59:48 2020 daemon.notice openvpn[12948]: Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
Wed Jun 10 23:59:48 2020 daemon.notice openvpn[12948]: Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
Wed Jun 10 23:59:48 2020 daemon.notice openvpn[12948]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: [nordvpnserver] Inactivity timeout (–ping-restart), restarting
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: /sbin/route del -net 217.138.192.75 netmask 255.255.255.255
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: Closing TUN/TAP interface
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: /sbin/ifconfig tun0 0.0.0.0
Thu Jun 11 00:09:24 2020 daemon.notice netifd: Network device ‘tun0’ link is down
Thu Jun 11 00:09:24 2020 daemon.notice netifd: Interface ‘ovpn’ has link connectivity loss
Thu Jun 11 00:09:24 2020 daemon.notice netifd: Interface ‘ovpn’ is now down
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.3.2 255.255.255.0 init
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: SIGHUP[soft,ping-restart] received, process restarting
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: OpenVPN 2.4.5 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: library versions: OpenSSL 1.0.2o 27 Mar 2018, LZO 2.10
Thu Jun 11 00:09:24 2020 daemon.notice openvpn[12948]: Restart pause, 5 second(s)
Thu Jun 11 00:09:25 2020 daemon.notice netifd: Interface ‘ovpn’ is disabled
Thu Jun 11 00:09:25 2020 daemon.info dnsmasq[13913]: exiting on receipt of SIGTERM
Thu Jun 11 00:09:26 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Thu Jun 11 00:09:26 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: started, version 2.80test2 cachesize 150
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: DNS service limited to local subnets
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq-dhcp[22041]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain test
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain onion
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain localhost
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain local
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain invalid
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain bind
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain lan
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: reading /tmp/resolv.conf.auto
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain test
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain onion
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain localhost
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain local
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain invalid
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain bind
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using local addresses only for domain lan
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: using nameserver 192.168.1.1#53
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: read /etc/hosts - 4 addresses
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq[22041]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Thu Jun 11 00:09:28 2020 daemon.info dnsmasq-dhcp[22041]: read /etc/ethers - 0 addresses
Thu Jun 11 00:09:29 2020 daemon.warn openvpn[12948]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Thu Jun 11 00:09:29 2020 daemon.warn openvpn[12948]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Jun 11 00:09:29 2020 daemon.notice openvpn[12948]: Outgoing Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Thu Jun 11 00:09:29 2020 daemon.notice openvpn[12948]: Incoming Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: TCP/UDP: Preserving recently used remote address: [AF_INET]217.138.192.75:1194
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: UDP link local: (not bound)
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: UDP link remote: [AF_INET]217.138.192.75:1194
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: TLS: Initial packet from [AF_INET]217.138.192.75:1194, sid=47851d7c b9d10007
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: VERIFY KU OK
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: Validating certificate extended key usage
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: VERIFY EKU OK
Thu Jun 11 00:09:30 2020 daemon.notice openvpn[12948]: VERIFY OK: depth=0, CN=hu44.nordvpn.com
Thu Jun 11 00:09:32 2020 daemon.notice openvpn[12948]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Jun 11 00:09:32 2020 daemon.notice openvpn[12948]: [nordvpnserver] Peer Connection Initiated with [AF_INET]217.138.192.75:1194
Thu Jun 11 00:09:33 2020 daemon.notice openvpn[12948]: SENT CONTROL [nordvpnserver]: ‘PUSH_REQUEST’ (status=1)
Thu Jun 11 00:09:33 2020 daemon.notice openvpn[12948]: AUTH: Received control message: AUTH_FAILED
Thu Jun 11 00:09:33 2020 daemon.notice openvpn[12948]: SIGTERM[soft,auth-failure] received, process exiting
Thu Jun 11 00:09:56 2020 daemon.info dnsmasq-dhcp[22041]: DHCPREQUEST(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3
Thu Jun 11 00:09:56 2020 daemon.info dnsmasq-dhcp[22041]: DHCPACK(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3 Samy

On my Brume MV1000 I also have the same problem as of he latest test firmware, 3.104.adguardhome of may 27. Before this I was on 3.104 may 18 and never had this problem. With the update all of my settings were lost and now every day the NordVPN connection disconnects 1 or 2 times a day. After about 1 to 2 minutes everything goes back to normal without having to do anything. I don’t remember having a disconnect problem with NordVPN before the latest update. And also this is the first time that I updated a GL product where all settings were deleted during update. Had to set everything back to what it was. P.S. the previous 3.104 version also had adguard in it.

Seems this is a problem. @luochongjun can you pls check?

I come back from work and my vpn is down once again.

This is the log when the vpn gone down:

> Thu Jun 11 13:04:39 2020 daemon.notice openvpn[9528]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: TLS: tls_process: killed expiring key
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: VERIFY KU OK
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: Validating certificate extended key usage
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: VERIFY EKU OK
> Thu Jun 11 14:04:39 2020 daemon.notice openvpn[9528]: VERIFY OK: depth=0, CN=vpnservicename
> Thu Jun 11 14:04:41 2020 daemon.notice openvpn[9528]: Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
> Thu Jun 11 14:04:41 2020 daemon.notice openvpn[9528]: Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
> Thu Jun 11 14:04:41 2020 daemon.notice openvpn[9528]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
> Thu Jun 11 14:12:37 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:37 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:38 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:39 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:41 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:43 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:43 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:45 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:49 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:51 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:52 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:12:53 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:13:06 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:13:07 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:13:08 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:13:09 2020 daemon.err openvpn[9528]: TLS Error: Unroutable control packet received from [AF_INET]134.19.189.83:1194 (si=3 op=P_CONTROL_V1)
> Thu Jun 11 14:13:58 2020 daemon.notice openvpn[9528]: [vpnservicename] Inactivity timeout (–ping-restart), restarting

and this is the LOG when I restarted the vpn service:

> Thu Jun 11 17:36:42 2020 user.info : 1334: gl-vpn-client>> Stop, vpnpath=/etc/openvpn/ovpn0, serverfile=nl745.nordvpn.com.udp.ovpn
> Thu Jun 11 17:36:43 2020 daemon.info dnsmasq[10027]: exiting on receipt of SIGTERM
> Thu Jun 11 17:36:44 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
> Thu Jun 11 17:36:44 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: started, version 2.80test2 cachesize 150
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: DNS service limited to local subnets
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq-dhcp[32585]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain test
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain onion
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain localhost
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain local
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain invalid
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain bind
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain lan
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: reading /tmp/resolv.conf.auto
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain test
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain onion
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain localhost
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain local
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain invalid
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain bind
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using local addresses only for domain lan
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: using nameserver 192.168.1.1#53
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: read /etc/hosts - 4 addresses
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq[32585]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
> Thu Jun 11 17:36:46 2020 daemon.info dnsmasq-dhcp[32585]: read /etc/ethers - 0 addresses
> Thu Jun 11 17:36:49 2020 daemon.notice netifd: Network device ‘ra0’ link is down
> Thu Jun 11 17:36:50 2020 daemon.warn dnsmasq[32585]: no servers found in /tmp/resolv.conf.auto, will retry
> Thu Jun 11 17:36:55 2020 daemon.notice netifd: Interface ‘wan’ is now down
> Thu Jun 11 17:36:55 2020 daemon.notice netifd: Interface ‘wan’ is disabled
> Thu Jun 11 17:36:55 2020 daemon.notice netifd: Interface ‘wan’ is enabled
> Thu Jun 11 17:36:55 2020 daemon.notice netifd: Interface ‘wan’ is setting up now
> Thu Jun 11 17:36:55 2020 daemon.notice netifd: Network device ‘ra0’ link is up
> Thu Jun 11 17:36:56 2020 daemon.info dnsmasq-dhcp[32585]: DHCPREQUEST(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3
> Thu Jun 11 17:36:56 2020 daemon.info dnsmasq-dhcp[32585]: DHCPACK(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3 Samy
> Thu Jun 11 17:36:56 2020 daemon.notice netifd: wan (522): udhcpc: started, v1.28.3
> Thu Jun 11 17:36:56 2020 daemon.notice netifd: wan (522): udhcpc: sending discover
> Thu Jun 11 17:36:56 2020 daemon.notice netifd: wan (522): udhcpc: sending select for 192.168.1.6
> Thu Jun 11 17:36:56 2020 daemon.notice netifd: wan (522): udhcpc: lease of 192.168.1.6 obtained, lease time 864000
> Thu Jun 11 17:36:57 2020 daemon.notice netifd: Interface ‘wan’ is now up
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: reading /tmp/resolv.conf.auto
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using local addresses only for domain test
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using local addresses only for domain onion
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using local addresses only for domain localhost
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using local addresses only for domain local
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using local addresses only for domain invalid
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using local addresses only for domain bind
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using local addresses only for domain lan
> Thu Jun 11 17:36:57 2020 daemon.info dnsmasq[32585]: using nameserver 192.168.1.1#53
> Thu Jun 11 17:36:58 2020 user.info : 1334: gl-vpn-client>> Start, vpnpath=/etc/openvpn/ovpn1, serverfile=vpnservicename.udp.ovpn
> Thu Jun 11 17:36:58 2020 user.info : 1390: gl-vpn-client>> glconfig.openvpn.ovpn=/etc/openvpn/ovpn1/vpnservicename.udp.ovpn, glconfig.openvpn.clientid=ovpn1
> Thu Jun 11 17:37:01 2020 daemon.info dnsmasq[32585]: exiting on receipt of SIGTERM
> Thu Jun 11 17:37:02 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
> Thu Jun 11 17:37:02 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: started, version 2.80test2 cachesize 150
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: DNS service limited to local subnets
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq-dhcp[1130]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain test
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain onion
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain localhost
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain local
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain invalid
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain bind
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain lan
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: reading /tmp/resolv.conf.auto
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain test
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain onion
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain localhost
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain local
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain invalid
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain bind
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using local addresses only for domain lan
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: using nameserver 192.168.1.1#53
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: read /etc/hosts - 4 addresses
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq[1130]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq-dhcp[1130]: read /etc/ethers - 0 addresses
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq-dhcp[1130]: DHCPREQUEST(br-lan) 192.168.8.107 34:12:98:92:26:05
> Thu Jun 11 17:37:04 2020 daemon.info dnsmasq-dhcp[1130]: DHCPACK(br-lan) 192.168.8.107 34:12:98:92:26:05 iPad-di-Samanta
> Thu Jun 11 17:37:07 2020 daemon.info dnsmasq-dhcp[1130]: DHCPREQUEST(br-lan) 192.168.8.169 f0:81:73:56:19:cc
> Thu Jun 11 17:37:07 2020 daemon.info dnsmasq-dhcp[1130]: DHCPACK(br-lan) 192.168.8.169 f0:81:73:56:19:cc amazon-36b4ac1cf
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1496]: OpenVPN 2.4.5 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1496]: library versions: OpenSSL 1.0.2o 27 Mar 2018, LZO 2.10
> Thu Jun 11 17:37:08 2020 daemon.warn openvpn[1507]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
> Thu Jun 11 17:37:08 2020 daemon.warn openvpn[1507]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1507]: Outgoing Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1507]: Incoming Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1507]: TCP/UDP: Preserving recently used remote address: [AF_INET]193.9.112.251:1194
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1507]: Socket Buffers: R=[163840->163840] S=[163840->163840]
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1507]: UDP link local: (not bound)
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1507]: UDP link remote: [AF_INET]193.9.112.251:1194
> Thu Jun 11 17:37:08 2020 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
> Thu Jun 11 17:37:08 2020 daemon.notice openvpn[1507]: TLS: Initial packet from [AF_INET]193.9.112.251:1194, sid=1404946e 39e3ef49
> Thu Jun 11 17:37:08 2020 daemon.warn openvpn[1507]: WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
> Thu Jun 11 17:37:12 2020 daemon.warn dnsmasq[1130]: no servers found in /tmp/resolv.conf.auto, will retry
> Thu Jun 11 17:37:14 2020 daemon.notice netifd: Network device ‘ra0’ link is down
> Thu Jun 11 17:37:14 2020 daemon.notice netifd: wan (522): udhcpc: received SIGTERM
> Thu Jun 11 17:37:14 2020 daemon.notice netifd: Interface ‘wan’ is now down
> Thu Jun 11 17:37:14 2020 daemon.notice netifd: Interface ‘wan’ is disabled
> Thu Jun 11 17:37:14 2020 daemon.notice netifd: Interface ‘wan’ is enabled
> Thu Jun 11 17:37:14 2020 daemon.notice netifd: Interface ‘wan’ is setting up now
> Thu Jun 11 17:37:21 2020 daemon.notice netifd: Network device ‘ra0’ link is up
> Thu Jun 11 17:37:21 2020 daemon.notice netifd: wan (1834): udhcpc: started, v1.28.3
> Thu Jun 11 17:37:21 2020 daemon.notice netifd: wan (1834): udhcpc: sending discover
> Thu Jun 11 17:37:21 2020 daemon.notice netifd: wan (1834): udhcpc: sending select for 192.168.1.6
> Thu Jun 11 17:37:21 2020 daemon.notice netifd: wan (1834): udhcpc: lease of 192.168.1.6 obtained, lease time 864000
> Thu Jun 11 17:37:22 2020 daemon.notice netifd: Interface ‘wan’ is now up
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: reading /tmp/resolv.conf.auto
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using local addresses only for domain test
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using local addresses only for domain onion
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using local addresses only for domain localhost
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using local addresses only for domain local
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using local addresses only for domain invalid
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using local addresses only for domain bind
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using local addresses only for domain lan
> Thu Jun 11 17:37:22 2020 daemon.info dnsmasq[1130]: using nameserver 192.168.1.1#53
> Thu Jun 11 17:37:24 2020 daemon.info dnsmasq-dhcp[1130]: DHCPREQUEST(br-lan) 192.168.8.107 34:12:98:92:26:05
> Thu Jun 11 17:37:24 2020 daemon.info dnsmasq-dhcp[1130]: DHCPACK(br-lan) 192.168.8.107 34:12:98:92:26:05 iPad-di-Samanta
> Thu Jun 11 17:37:24 2020 daemon.info dnsmasq-dhcp[1130]: DHCPREQUEST(br-lan) 192.168.8.169 f0:81:73:56:19:cc
> Thu Jun 11 17:37:24 2020 daemon.info dnsmasq-dhcp[1130]: DHCPACK(br-lan) 192.168.8.169 f0:81:73:56:19:cc amazon-36b4ac1cf
> Thu Jun 11 17:37:26 2020 daemon.info dnsmasq-dhcp[1130]: DHCPREQUEST(br-lan) 192.168.8.107 34:12:98:92:26:05
> Thu Jun 11 17:37:26 2020 daemon.info dnsmasq-dhcp[1130]: DHCPACK(br-lan) 192.168.8.107 34:12:98:92:26:05 iPad-di-Samanta
> Thu Jun 11 17:37:27 2020 daemon.info dnsmasq-dhcp[1130]: DHCPREQUEST(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3
> Thu Jun 11 17:37:27 2020 daemon.info dnsmasq-dhcp[1130]: DHCPACK(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3 Samy
> Thu Jun 11 17:37:27 2020 daemon.info dnsmasq-dhcp[1130]: DHCPREQUEST(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3
> Thu Jun 11 17:37:27 2020 daemon.info dnsmasq-dhcp[1130]: DHCPACK(br-lan) 192.168.8.207 6c:71:d9:4f:75:b3 Samy
> Thu Jun 11 17:37:30 2020 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
> Thu Jun 11 17:38:08 2020 daemon.err openvpn[1507]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
> Thu Jun 11 17:38:08 2020 daemon.err openvpn[1507]: TLS Error: TLS handshake failed
> Thu Jun 11 17:38:08 2020 daemon.notice openvpn[1507]: SIGHUP[soft,tls-error] received, process restarting
> Thu Jun 11 17:38:08 2020 daemon.notice openvpn[1507]: OpenVPN 2.4.5 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
> Thu Jun 11 17:38:08 2020 daemon.notice openvpn[1507]: library versions: OpenSSL 1.0.2o 27 Mar 2018, LZO 2.10
> Thu Jun 11 17:38:08 2020 daemon.notice openvpn[1507]: Restart pause, 5 second(s)
> Thu Jun 11 17:38:13 2020 daemon.warn openvpn[1507]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
> Thu Jun 11 17:38:13 2020 daemon.warn openvpn[1507]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: Outgoing Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: Incoming Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: TCP/UDP: Preserving recently used remote address: [AF_INET]193.9.112.251:1194
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: Socket Buffers: R=[163840->163840] S=[163840->163840]
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: UDP link local: (not bound)
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: UDP link remote: [AF_INET]193.9.112.251:1194
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: TLS: Initial packet from [AF_INET]193.9.112.251:1194, sid=4f8595c6 e80ff025
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: VERIFY KU OK
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: Validating certificate extended key usage
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: VERIFY EKU OK
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: VERIFY OK: depth=0, CN=vpnservicename
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
> Thu Jun 11 17:38:13 2020 daemon.notice openvpn[1507]: [vpnservicename] Peer Connection Initiated with [AF_INET]193.9.112.251:1194
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: SENT CONTROL [vpnservicename]: ‘PUSH_REQUEST’ (status=1)
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: PUSH: Received control message: ‘PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.18 255.255.255.0,peer-id 13,cipher AES-256-GCM’
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: timers and/or timeouts modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: explicit notify parm(s) modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: compression parms modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: --sndbuf/–rcvbuf options modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: Socket Buffers: R=[163840->327680] S=[163840->327680]
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: --ifconfig/up options modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: route options modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: route-related options modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: peer-id set
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: adjusting link_mtu to 1657
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: OPTIONS IMPORT: data channel crypto options modified
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: Data Channel: using negotiated cipher ‘AES-256-GCM’
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
> Thu Jun 11 17:38:14 2020 daemon.notice netifd: Interface ‘ovpn’ is enabled
> Thu Jun 11 17:38:14 2020 daemon.notice netifd: Network device ‘tun0’ link is up
> Thu Jun 11 17:38:14 2020 daemon.notice netifd: Interface ‘ovpn’ has link connectivity
> Thu Jun 11 17:38:14 2020 daemon.notice netifd: Interface ‘ovpn’ is setting up now
> Thu Jun 11 17:38:14 2020 daemon.notice netifd: Interface ‘ovpn’ is now up
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: TUN/TAP device tun0 opened
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: TUN/TAP TX queue length set to 100
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: /sbin/ifconfig tun0 10.8.0.18 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
> Thu Jun 11 17:38:14 2020 daemon.notice openvpn[1507]: /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.0.18 255.255.255.0 init
> Thu Jun 11 17:38:15 2020 daemon.info dnsmasq[1130]: exiting on receipt of SIGTERM
> Thu Jun 11 17:38:16 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
> Thu Jun 11 17:38:16 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
> Thu Jun 11 17:38:17 2020 daemon.notice openvpn[1507]: /sbin/route add -net 193.9.112.251 netmask 255.255.255.255 gw 192.168.1.1
> Thu Jun 11 17:38:17 2020 daemon.warn openvpn[1507]: ERROR: Linux route add command failed: external program exited with error status: 1
> Thu Jun 11 17:38:17 2020 daemon.notice openvpn[1507]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
> Thu Jun 11 17:38:17 2020 daemon.notice openvpn[1507]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
> Thu Jun 11 17:38:19 2020 user.notice firewall: Reloading firewall due to ifup of ovpn (tun0)
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: started, version 2.80test2 cachesize 150
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: DNS service limited to local subnets
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC no-ID loop-detect inotify dumpfile
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq-dhcp[4003]: DHCP, IP range 192.168.8.100 – 192.168.8.249, lease time 12h
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain test
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain onion
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain localhost
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain local
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain invalid
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain bind
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain lan
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: reading /tmp/resolv.conf.vpn
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain test
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain onion
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain localhost
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain local
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain invalid
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain bind
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using local addresses only for domain lan
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using nameserver 103.86.96.100#53
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: using nameserver 103.86.99.100#53
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: read /etc/hosts - 4 addresses
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq[4003]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
> Thu Jun 11 17:38:19 2020 daemon.info dnsmasq-dhcp[4003]: read /etc/ethers - 0 addresses
> Thu Jun 11 17:38:21 2020 user.notice firewall: Reloading firewall due to ifup of ovpn (tun0)
> Thu Jun 11 17:38:25 2020 user.notice root: check route success
> Thu Jun 11 17:38:25 2020 daemon.notice openvpn[1507]: Initialization Sequence Completed

Sorry if the post is long but being a new user I can’t attach files

Can I share a configuration file?
There is no need to share a secret key, just provide configuration options.

Do you talk about my logs? @luochongjun

I need the configuration items in the OVPN file.

If the GUI is showing as connected (ie. you see the red “disconnect” button), then this is simply a NordVPN problem. You can search on the forum for reconnect script, as this has been covered extensively but your best bet is to ditch the rotten Nord service and try someone else.

I have already add the reconnection script and tryed different vpn service but with same result.

As stated before, I had a similar problem with NordVPN on the newest test version. I switched to Azire VPN (WireGuard protocol) and for 2 days now I’ve had NO disconnections. Looks like the newest test version on Brume does not play nicely with NordVPN or vice versa.