I have problem with connecting openvpn and i am getting log below :
Wed Nov 6 11:56:31 2024 daemon.notice netifd: ovpnclient (22996): [!] Section glblock option 'reload' is not supported by fw4
Wed Nov 6 11:56:31 2024 daemon.notice netifd: ovpnclient (22996): [!] Section vpn_server_policy option 'reload' is not supported by fw4
Wed Nov 6 11:56:31 2024 daemon.notice netifd: ovpnclient (22996): [!] Automatically including '/usr/share/nftables.d/chain-pre/mangle_output/01-process_mark.nft'
Wed Nov 6 11:56:31 2024 daemon.notice netifd: ovpnclient (22996): [!] Automatically including '/usr/share/nftables.d/chain-post/mangle_output/out_conn_mark_restore.nft'
Wed Nov 6 11:56:32 2024 daemon.notice netifd: ovpnclient (22996): DROP all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set GL_MAC_BLOCK src
Wed Nov 6 11:56:33 2024 daemon.notice netifd: ovpnclient (22996): Failed to parse json data: unexpected character
Wed Nov 6 11:56:33 2024 daemon.notice netifd: ovpnclient (22996): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Wed Nov 6 11:56:34 2024 daemon.notice netifd: Interface 'ovpnclient' is now down
Wed Nov 6 11:56:34 2024 daemon.notice netifd: Interface 'ovpnclient' is setting up now
Wed Nov 6 11:56:35 2024 daemon.warn ovpnclient[23224]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: OpenVPN 2.5.7 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: library versions: OpenSSL 1.1.1t 7 Feb 2023, LZO 2.10
Wed Nov 6 11:56:35 2024 daemon.warn ovpnclient[23224]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: TCP/UDP: Preserving recently used remote address: [AF_INET]5.202.6.91:5054
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Wed Nov 6 11:56:35 2024 daemon.notice ovpnclient[23224]: Attempting to establish TCP connection with [AF_INET]5.202.6.91:5054 [nonblock]