The problem is I don't get a continuous feed. The log window displays some data, then clears and displays some new entries. It does this about every 10 seconds. Here is a lengthly copy and paste on a retry
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Set tcp_window_scaling to on
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/etc/firewall.nat6'
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/var/etc/gls2s.include'
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): ! Skipping due to path error: No such file or directory
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/usr/bin/gl_block.sh'
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/etc/firewall.vpn_server_policy.sh'
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): Failed to parse json data: unexpected character
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): uci: Entry not found
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Sun Oct 13 14:42:00 2024 daemon.notice netifd: Interface 'ovpnclient' is now down
Sun Oct 13 14:42:00 2024 user.notice firewall: Reloading firewall due to ifdown of ovpnclient ()
Sun Oct 13 14:42:27 2024 daemon.notice netifd: Interface 'ovpnclient' is setting up now
Sun Oct 13 14:42:27 2024 daemon.warn ovpnclient[30918]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
Sun Oct 13 14:42:27 2024 daemon.warn ovpnclient[30918]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sun Oct 13 14:42:27 2024 daemon.notice ovpnclient[30918]: OpenVPN 2.5.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Oct 13 14:42:27 2024 daemon.notice ovpnclient[30918]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10
Sun Oct 13 14:42:27 2024 daemon.warn ovpnclient[30918]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Oct 13 14:42:27 2024 daemon.notice ovpnclient[30918]: Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sun Oct 13 14:42:34 2024 daemon.warn ovpnclient[31135]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: TCP/UDP: Preserving recently used remote address: [AF_INET]102.165.48.95:443
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: UDP link local: (not bound)
Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: UDP link remote: [AF_INET]102.165.48.95:443
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: TLS: Initial packet from [AF_INET]102.165.48.95:443, sid=84ad0304 7cbcb27c
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY KU OK
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: Validating certificate extended key usage
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY EKU OK
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY OK: depth=0, CN=washington-rack403.nodes.gen4.ninja
Sun Oct 13 14:42:36 2024 daemon.warn ovpnclient[31135]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1553'
Sun Oct 13 14:42:36 2024 daemon.warn ovpnclient[31135]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: [washington-rack403.nodes.gen4.ninja] Peer Connection Initiated with [AF_INET]102.165.48.95:443
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Rule 'wan_in_conn_mark'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Rule 'lan_in_conn_mark_restore'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Rule 'out_conn_mark_restore'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'lan'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'wan'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'guest'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'ovpnclient'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Set tcp_ecn to off
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Set tcp_syncookies to on
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Set tcp_window_scaling to on
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/etc/firewall.nat6'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/var/etc/gls2s.include'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): ! Skipping due to path error: No such file or directory
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/usr/bin/gl_block.sh'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/etc/firewall.vpn_server_policy.sh'
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): Failed to parse json data: unexpected character
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): uci: Entry not found
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Sun Oct 13 14:42:56 2024 daemon.warn ovpnclient[31899]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: TCP/UDP: Preserving recently used remote address: [AF_INET]184.170.240.247:443
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: UDP link local: (not bound)
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: UDP link remote: [AF_INET]184.170.240.247:443
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: TLS: Initial packet from [AF_INET]184.170.240.247:443, sid=4a9c8823 614ee122
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY KU OK
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Validating certificate extended key usage
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY EKU OK
Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY OK: depth=0, CN=phoenix-rack456.nodes.gen4.ninja
Sun Oct 13 14:42:57 2024 daemon.warn ovpnclient[31899]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1553'
Sun Oct 13 14:42:57 2024 daemon.warn ovpnclient[31899]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Sun Oct 13 14:42:57 2024 daemon.notice ovpnclient[31899]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Sun Oct 13 14:42:57 2024 daemon.notice ovpnclient[31899]: [phoenix-rack456.nodes.gen4.ninja] Peer Connection Initiated with [AF_INET]184.170.240.247:443
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Rule 'wan_in_conn_mark'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Rule 'lan_in_conn_mark_restore'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Rule 'out_conn_mark_restore'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'lan'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'wan'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'guest'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'ovpnclient'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Set tcp_ecn to off
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Set tcp_syncookies to on
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Set tcp_window_scaling to on
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/etc/firewall.nat6'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/var/etc/gls2s.include'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): ! Skipping due to path error: No such file or directory
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/usr/bin/gl_block.sh'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/etc/firewall.vpn_server_policy.sh'
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): Failed to parse json data: unexpected character
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): uci: Entry not found
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory