Restarting a jail completely?

vidx

Dabbler
Joined
Oct 16, 2021
Messages
40
Hi guys,

I have a Deluge jail with OpenVPN connected to NordVPN. Every now and then, OpenVPN will reconnect to another IP address, presumably because the connection was idle over a period of time, and Deluge will stop working. Somehow the status bar will show the IP address of the old connection yet unable to download anything.

Restarting the jail through the GUI will reconnect to OpenVPN with a new IP address, however, Deluge's status bar will show IP as N/A. Downloading will fail.

Stopping and starting the jail doesn't help even though VPN is connected. Using the terminal to restart
Code:
truenas# iocage restart deluge
doesn't work.

The only way to resolve this is to restart the whole NAS system, which I am trying to avoid. Is there a way around this?
 
Joined
Jan 7, 2015
Messages
1,155
Show your config file for openvpn, you might also show any killswitch rules.
 

vidx

Dabbler
Joined
Oct 16, 2021
Messages
40
I followed the guide at https://www.digimoot.com/truenas-add-vpn-connection-to-a-jail/

The config files were downloaded from https://nordvpn.com/ovpn/

Here is a sample opvn file

Code:
client
dev tun
proto tcp
remote 31.171.152.19 443
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo no

remote-cert-tls server

auth-user-pass
verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512
<ca>
-----BEGIN CERTIFICATE-----
MIIFCjCCAvKgAwIBAgIBATANBgkqhkiG9w0BAQ0FADA5MQswCQYDVQQGEwJQQTEQ
MA4GA1UEChMHTm9yZFZQTjEYMBYGA1UEAxMPTm9yZFZQTiBSb290IENBMB4XDTE2
MDEwMTAwMDAwMFoXDTM1MTIzMTIzNTk1OVowOTELMAkGA1UEBhMCUEExEDAOBgNV
BAoTB05vcmRWUE4xGDAWBgNVBAMTD05vcmRWUE4gUm9vdCBDQTCCAiIwDQYJKoZI
hvcNAQEBBQADggIPADCCAgoCggIBAMkr/BYhyo0F2upsIMXwC6QvkZps3NN2/eQF
kfQIS1gql0aejsKsEnmY0Kaon8uZCTXPsRH1gQNgg5D2gixdd1mJUvV3dE3y9FJr
XMoDkXdCGBodvKJyU6lcfEVF6/UxHcbBguZK9UtRHS9eJYm3rpL/5huQMCppX7kU
eQ8dpCwd3iKITqwd1ZudDqsWaU0vqzC2H55IyaZ/5/TnCk31Q1UP6BksbbuRcwOV
skEDsm6YoWDnn/IIzGOYnFJRzQH5jTz3j1QBvRIuQuBuvUkfhx1FEwhwZigrcxXu
MP+QgM54kezgziJUaZcOM2zF3lvrwMvXDMfNeIoJABv9ljw969xQ8czQCU5lMVmA
37ltv5Ec9U5hZuwk/9QO1Z+d/r6Jx0mlurS8gnCAKJgwa3kyZw6e4FZ8mYL4vpRR
hPdvRTWCMJkeB4yBHyhxUmTRgJHm6YR3D6hcFAc9cQcTEl/I60tMdz33G6m0O42s
Qt/+AR3YCY/RusWVBJB/qNS94EtNtj8iaebCQW1jHAhvGmFILVR9lzD0EzWKHkvy
WEjmUVRgCDd6Ne3eFRNS73gdv/C3l5boYySeu4exkEYVxVRn8DhCxs0MnkMHWFK6
MyzXCCn+JnWFDYPfDKHvpff/kLDobtPBf+Lbch5wQy9quY27xaj0XwLyjOltpiST
LWae/Q4vAgMBAAGjHTAbMAwGA1UdEwQFMAMBAf8wCwYDVR0PBAQDAgEGMA0GCSqG
SIb3DQEBDQUAA4ICAQC9fUL2sZPxIN2mD32VeNySTgZlCEdVmlq471o/bDMP4B8g
nQesFRtXY2ZCjs50Jm73B2LViL9qlREmI6vE5IC8IsRBJSV4ce1WYxyXro5rmVg/
k6a10rlsbK/eg//GHoJxDdXDOokLUSnxt7gk3QKpX6eCdh67p0PuWm/7WUJQxH2S
DxsT9vB/iZriTIEe/ILoOQF0Aqp7AgNCcLcLAmbxXQkXYCCSB35Vp06u+eTWjG0/
pyS5V14stGtw+fA0DJp5ZJV4eqJ5LqxMlYvEZ/qKTEdoCeaXv2QEmN6dVqjDoTAo
k0t5u4YRXzEVCfXAC3ocplNdtCA72wjFJcSbfif4BSC8bDACTXtnPC7nD0VndZLp
+RiNLeiENhk0oTC+UVdSc+n2nJOzkCK0vYu0Ads4JGIB7g8IB3z2t9ICmsWrgnhd
NdcOe15BincrGA8avQ1cWXsfIKEjbrnEuEk9b5jel6NfHtPKoHc9mDpRdNPISeVa
wDBM1mJChneHt59Nh8Gah74+TM1jBsw4fhJPvoc7Atcg740JErb904mZfkIEmojC
VPhBHVQ9LHBAdM8qFI2kRK0IynOmAZhexlP/aT/kpEsEPyaZQlnBn3An1CRz8h0S
PApL8PytggYKeQmRhl499+6jLxcZ2IegLfqq41dzIjwHwTMplg+1pKIOVojpWA==
-----END CERTIFICATE-----
</ca>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
e685bdaf659a25a200e2b9e39e51ff03
0fc72cf1ce07232bd8b2be5e6c670143
f51e937e670eee09d4f2ea5a6e4e6996
5db852c275351b86fc4ca892d78ae002
d6f70d029bd79c4d1c26cf14e9588033
cf639f8a74809f29f72b9d58f9b8f5fe
fc7938eade40e9fed6cb92184abb2cc1
0eb1a296df243b251df0643d53724cdb
5a92a1d6cb817804c4a9319b57d53be5
80815bcfcb2df55018cc83fc43bc7ff8
2d51f9b88364776ee9d12fc85cc7ea5b
9741c4f598c485316db066d52db4540e
212e1518a9bd4828219e24b20d88f598
a196c9de96012090e333519ae18d3509
9427e7b372d348d352dc4c85e18cd4b9
3f8a56ddb2e64eb67adfc9b337157ff4
-----END OpenVPN Static key V1-----
</tls-auth>


Following the guide, I added this below the config

Code:
auth-user-pass /usr/local/etc/openvpn/auth.txt
auth-nocache


The guide did mention that the entire NAS system needs to be restarted after configuring, which I am now assuming to be the reason and hoping someone has a solution.

Now, you will need to reboot the entire TrueNAS server. Yes, the whole physical machine. Yes, this is a real pain.
 
Last edited:
Joined
Jan 7, 2015
Messages
1,155
So what is the logs saying when this disconnects? ovpn logs could be in a few diff spots, try (in the deluge jail) cat /var/log/messages or maybe cat /var/log/openvpn/openvpn.log
 
Joined
Jan 7, 2015
Messages
1,155
Also look into the

ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0

This could be doing something. Ive never used this before, everything else seems on the up.
 

vidx

Dabbler
Joined
Oct 16, 2021
Messages
40
This is what's showing in /var/log/messages.

Code:
Dec 14 13:00:04 deluge newsyslog[6011]: logfile turned over due to size>1000K
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY KU OK
Dec 14 13:42:16 deluge openvpn[2544]: Validating certificate extended key usage
Dec 14 13:42:16 deluge openvpn[2544]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY EKU OK
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY OK: depth=0, CN=hk273.nordvpn.com
Dec 14 13:42:16 deluge openvpn[2544]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:42:16 deluge openvpn[2544]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:42:16 deluge openvpn[2544]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 13:44:49 deluge openvpn[2544]: event_wait : Interrupted system call (code=4)
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/route delete -net 185.225.234.17 192.168.0.1 255.255.255.255
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/route delete -net 0.0.0.0 10.7.0.1 128.0.0.0
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/route delete -net 128.0.0.0 10.7.0.1 128.0.0.0
Dec 14 13:44:49 deluge openvpn[2544]: Closing TUN/TAP interface
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/ifconfig tun1 destroy
Dec 14 13:44:49 deluge openvpn[2544]: SIGTERM[hard,] received, process exiting
Dec 14 13:44:49 deluge syslogd: exiting on signal 15
Dec 14 13:46:27 deluge syslogd: kernel boot file is /boot/kernel/kernel
Dec 14 13:46:27 deluge openvpn[2539]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Dec 14 13:46:27 deluge openvpn[2539]: OpenVPN 2.5.3 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Aug 26 2021
Dec 14 13:46:27 deluge openvpn[2539]: library versions: OpenSSL 1.1.1h-freebsd  24 Aug 2021, LZO 2.10
Dec 14 13:46:27 deluge openvpn[2540]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Dec 14 13:46:27 deluge openvpn[2540]: NOTE: --fast-io is disabled since we are not using UDP
Dec 14 13:46:27 deluge openvpn[2540]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 14 13:46:27 deluge openvpn[2540]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 14 13:46:27 deluge openvpn[2540]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.225.234.11:443
Dec 14 13:46:27 deluge openvpn[2540]: Socket Buffers: R=[65536->65536] S=[32768->32768]
Dec 14 13:46:27 deluge openvpn[2540]: Attempting to establish TCP connection with [AF_INET]185.225.234.11:443 [nonblock]
Dec 14 13:46:27 deluge openvpn[2540]: TCP connection established with [AF_INET]185.225.234.11:443
Dec 14 13:46:27 deluge openvpn[2540]: TCP_CLIENT link local: (not bound)
Dec 14 13:46:27 deluge openvpn[2540]: TCP_CLIENT link remote: [AF_INET]185.225.234.11:443
Dec 14 13:46:27 deluge openvpn[2540]: TLS: Initial packet from [AF_INET]185.225.234.11:443, sid=7e0aec5d d6d2cf63
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY KU OK
Dec 14 13:46:27 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 13:46:27 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 13:46:28 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 13:46:28 deluge openvpn[2540]: [hk270.nordvpn.com] Peer Connection Initiated with [AF_INET]185.225.234.11:443
Dec 14 13:46:29 deluge openvpn[2540]: SENT CONTROL [hk270.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Dec 14 13:46:29 deluge openvpn[2540]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.1.4 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: timers and/or timeouts modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: compression parms modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Dec 14 13:46:29 deluge openvpn[2540]: Socket Buffers: R=[65700->524288] S=[33580->524288]
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --ifconfig/up options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: route options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: route-related options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: peer-id set
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: adjusting link_mtu to 1659
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: data channel crypto options modified
Dec 14 13:46:29 deluge openvpn[2540]: Data Channel: using negotiated cipher 'AES-256-GCM'
Dec 14 13:46:29 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:46:29 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:46:29 deluge openvpn[2540]: ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=epair0b HWADDR=02:e0:4c:56:71:78
Dec 14 13:46:29 deluge openvpn[2540]: TUN/TAP device /dev/tun1 opened
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/ifconfig tun1 10.7.1.4 10.7.1.1 mtu 1500 netmask 255.255.255.0 up
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 10.7.1.0 10.7.1.1 255.255.255.0
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 185.225.234.11 192.168.0.1 255.255.255.255
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 0.0.0.0 10.7.1.1 128.0.0.0
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 128.0.0.0 10.7.1.1 128.0.0.0
Dec 14 13:46:29 deluge openvpn[2540]: Initialization Sequence Completed
Dec 14 14:46:28 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 14:46:28 deluge openvpn[2540]: VERIFY KU OK
Dec 14 14:46:28 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 14:46:28 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 14:46:28 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 14:46:28 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 14:46:28 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 14:46:28 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 14:46:28 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 15:46:28 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 14 15:46:28 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 15:46:28 deluge openvpn[2540]: VERIFY KU OK
Dec 14 15:46:28 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 15:46:28 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 15:46:28 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 15:46:28 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 15:46:28 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 15:46:28 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 15:46:28 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 16:46:28 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 14 16:46:28 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 16:46:28 deluge openvpn[2540]: VERIFY KU OK
Dec 14 16:46:28 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 16:46:28 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 16:46:28 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 16:46:28 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 16:46:28 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 16:46:28 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 16:46:28 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 17:46:28 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 17:46:28 deluge openvpn[2540]: VERIFY KU OK
Dec 14 17:46:28 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 17:46:28 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 17:46:28 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 17:46:28 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 17:46:28 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 17:46:28 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 17:46:28 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 18:46:28 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 18:46:28 deluge openvpn[2540]: VERIFY KU OK
Dec 14 18:46:28 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 18:46:28 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 18:46:28 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 18:46:28 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 18:46:28 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 18:46:28 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 18:46:28 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 19:46:28 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 14 19:46:28 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 19:46:28 deluge openvpn[2540]: VERIFY KU OK
Dec 14 19:46:28 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 19:46:28 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 19:46:28 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 19:46:28 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 19:46:29 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 19:46:29 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 19:46:29 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 20:46:28 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 14 20:46:29 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 20:46:29 deluge openvpn[2540]: VERIFY KU OK
Dec 14 20:46:29 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 20:46:29 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 20:46:29 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 20:46:29 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 20:46:29 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 20:46:29 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 20:46:29 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 21:46:29 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 21:46:29 deluge openvpn[2540]: VERIFY KU OK
Dec 14 21:46:29 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 21:46:29 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 21:46:29 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 21:46:29 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 21:46:30 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 21:46:30 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 21:46:30 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 22:46:29 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 14 22:46:31 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 22:46:31 deluge openvpn[2540]: VERIFY KU OK
Dec 14 22:46:31 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 22:46:31 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 22:46:31 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 22:46:31 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 22:46:31 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 22:46:31 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 22:46:31 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 23:46:31 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 23:46:31 deluge openvpn[2540]: VERIFY KU OK
Dec 14 23:46:31 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 23:46:31 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 23:46:31 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 23:46:31 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 23:46:32 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 23:46:32 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 23:46:32 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 00:46:31 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 00:46:32 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 00:46:32 deluge openvpn[2540]: VERIFY KU OK
Dec 15 00:46:32 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 00:46:32 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 00:46:32 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 00:46:32 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 00:46:32 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 00:46:32 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 00:46:32 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 01:46:32 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 01:46:32 deluge openvpn[2540]: VERIFY KU OK
Dec 15 01:46:32 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 01:46:32 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 01:46:32 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 01:46:32 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 01:46:32 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 01:46:32 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 01:46:32 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 02:46:32 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 02:46:32 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 02:46:32 deluge openvpn[2540]: VERIFY KU OK
Dec 15 02:46:32 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 02:46:32 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 02:46:32 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 02:46:32 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 02:46:33 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 02:46:33 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 02:46:33 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 03:46:32 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 03:46:33 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 03:46:33 deluge openvpn[2540]: VERIFY KU OK
Dec 15 03:46:33 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 03:46:33 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 03:46:33 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 03:46:33 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 03:46:34 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 03:46:34 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 03:46:34 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 04:46:33 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 04:46:34 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 04:46:34 deluge openvpn[2540]: VERIFY KU OK
Dec 15 04:46:34 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 04:46:34 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 04:46:34 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 04:46:34 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 04:46:35 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 04:46:35 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 04:46:35 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 05:46:34 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 05:46:35 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 05:46:35 deluge openvpn[2540]: VERIFY KU OK
Dec 15 05:46:35 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 05:46:35 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 05:46:35 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 05:46:35 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 05:46:36 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 05:46:36 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 05:46:36 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 06:46:35 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 06:46:36 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 06:46:36 deluge openvpn[2540]: VERIFY KU OK
Dec 15 06:46:36 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 06:46:36 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 06:46:36 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 06:46:36 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 06:46:37 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 06:46:37 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 06:46:37 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 07:46:36 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 07:46:37 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 07:46:37 deluge openvpn[2540]: VERIFY KU OK
Dec 15 07:46:37 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 07:46:37 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 07:46:37 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 07:46:37 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 07:46:38 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 07:46:38 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 07:46:38 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 08:46:37 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 08:46:38 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 08:46:38 deluge openvpn[2540]: VERIFY KU OK
Dec 15 08:46:38 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 08:46:38 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 08:46:38 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 08:46:38 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 08:46:39 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 08:46:39 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 08:46:39 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 15 09:46:38 deluge openvpn[2540]: TLS: tls_process: killed expiring key
Dec 15 09:46:39 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 15 09:46:39 deluge openvpn[2540]: VERIFY KU OK
Dec 15 09:46:39 deluge openvpn[2540]: Validating certificate extended key usage
Dec 15 09:46:39 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 15 09:46:39 deluge openvpn[2540]: VERIFY EKU OK
Dec 15 09:46:39 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 15 09:46:39 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 09:46:39 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 15 09:46:39 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512


ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
Should I just remove those lines?
 
Joined
Jan 7, 2015
Messages
1,155
So it appears to be reconnecting every hour on the hour
 

vidx

Dabbler
Joined
Oct 16, 2021
Messages
40
Hmm... yes, that seems to be the case. That means I'm getting the same IP most of the time. Problem starts when the IP changes. Is there anything that could circumvent that?
 
Joined
Jan 7, 2015
Messages
1,155
Yes I would try getting rid of everything not essential. Also a couple references to your not using of UDP The most interesting part otherwise in the logs are this...
Code:
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY KU OK
Dec 14 13:42:16 deluge openvpn[2544]: Validating certificate extended key usage
Dec 14 13:42:16 deluge openvpn[2544]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY EKU OK
Dec 14 13:42:16 deluge openvpn[2544]: VERIFY OK: depth=0, CN=hk273.nordvpn.com
Dec 14 13:42:16 deluge openvpn[2544]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:42:16 deluge openvpn[2544]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:42:16 deluge openvpn[2544]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 13:44:49 deluge openvpn[2544]: event_wait : Interrupted system call (code=4)
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/route delete -net 185.225.234.17 192.168.0.1 255.255.255.255
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/route delete -net 0.0.0.0 10.7.0.1 128.0.0.0
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/route delete -net 128.0.0.0 10.7.0.1 128.0.0.0
Dec 14 13:44:49 deluge openvpn[2544]: Closing TUN/TAP interface
Dec 14 13:44:49 deluge openvpn[2544]: /sbin/ifconfig tun1 destroy
Dec 14 13:44:49 deluge openvpn[2544]: SIGTERM[hard,] received, process exiting
Dec 14 13:44:49 deluge syslogd: exiting on signal 15
Dec 14 13:46:27 deluge syslogd: kernel boot file is /boot/kernel/kernel
Dec 14 13:46:27 deluge openvpn[2539]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Dec 14 13:46:27 deluge openvpn[2539]: OpenVPN 2.5.3 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Aug 26 2021
Dec 14 13:46:27 deluge openvpn[2539]: library versions: OpenSSL 1.1.1h-freebsd  24 Aug 2021, LZO 2.10
Dec 14 13:46:27 deluge openvpn[2540]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
Dec 14 13:46:27 deluge openvpn[2540]: NOTE: --fast-io is disabled since we are not using UDP
Dec 14 13:46:27 deluge openvpn[2540]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 14 13:46:27 deluge openvpn[2540]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Dec 14 13:46:27 deluge openvpn[2540]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.225.234.11:443
Dec 14 13:46:27 deluge openvpn[2540]: Socket Buffers: R=[65536->65536] S=[32768->32768]
Dec 14 13:46:27 deluge openvpn[2540]: Attempting to establish TCP connection with [AF_INET]185.225.234.11:443 [nonblock]
Dec 14 13:46:27 deluge openvpn[2540]: TCP connection established with [AF_INET]185.225.234.11:443
Dec 14 13:46:27 deluge openvpn[2540]: TCP_CLIENT link local: (not bound)
Dec 14 13:46:27 deluge openvpn[2540]: TCP_CLIENT link remote: [AF_INET]185.225.234.11:443
Dec 14 13:46:27 deluge openvpn[2540]: TLS: Initial packet from [AF_INET]185.225.234.11:443, sid=7e0aec5d d6d2cf63
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY KU OK
Dec 14 13:46:27 deluge openvpn[2540]: Validating certificate extended key usage
Dec 14 13:46:27 deluge openvpn[2540]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY EKU OK
Dec 14 13:46:27 deluge openvpn[2540]: VERIFY OK: depth=0, CN=hk270.nordvpn.com
Dec 14 13:46:28 deluge openvpn[2540]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Dec 14 13:46:28 deluge openvpn[2540]: [hk270.nordvpn.com] Peer Connection Initiated with [AF_INET]185.225.234.11:443
Dec 14 13:46:29 deluge openvpn[2540]: SENT CONTROL [hk270.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Dec 14 13:46:29 deluge openvpn[2540]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.1.4 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: timers and/or timeouts modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: compression parms modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Dec 14 13:46:29 deluge openvpn[2540]: Socket Buffers: R=[65700->524288] S=[33580->524288]
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --ifconfig/up options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: route options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: route-related options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: peer-id set
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: adjusting link_mtu to 1659
Dec 14 13:46:29 deluge openvpn[2540]: OPTIONS IMPORT: data channel crypto options modified
Dec 14 13:46:29 deluge openvpn[2540]: Data Channel: using negotiated cipher 'AES-256-GCM'
Dec 14 13:46:29 deluge openvpn[2540]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:46:29 deluge openvpn[2540]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 14 13:46:29 deluge openvpn[2540]: ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=epair0b HWADDR=02:e0:4c:56:71:78
Dec 14 13:46:29 deluge openvpn[2540]: TUN/TAP device /dev/tun1 opened
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/ifconfig tun1 10.7.1.4 10.7.1.1 mtu 1500 netmask 255.255.255.0 up
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 10.7.1.0 10.7.1.1 255.255.255.0
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 185.225.234.11 192.168.0.1 255.255.255.255
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 0.0.0.0 10.7.1.1 128.0.0.0
Dec 14 13:46:29 deluge openvpn[2540]: /sbin/route add -net 128.0.0.0 10.7.1.1 128.0.0.0
Dec 14 13:46:29 deluge openvpn[2540]: Initialization Sequence Completed
 
Joined
Jan 7, 2015
Messages
1,155
Also you are specifying to use cipher AES-256-CBC, however thats not what its using.
OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Research this
 

vidx

Dabbler
Joined
Oct 16, 2021
Messages
40
Also you are specifying to use cipher AES-256-CBC, however thats not what its using.

Research this
Thanks! I will check it out. And try with UDP along with removing some of the config lines.
 
Joined
Jan 7, 2015
Messages
1,155
Id try something like this..

Code:
client
dev tun
proto udp
remote 31.171.152.19 443
resolv-retry infinite
remote-random
nobind
#tun-mtu 1500
#tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
#ping 15
#ping-restart 0
#ping-timer-rem
#reneg-sec 0
comp-lzo no

remote-cert-tls server

auth-user-pass
verb 3
pull
fast-io
data-ciphers AES-256-GCM AES-256-CBC
auth SHA512
<ca>
-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
</ca>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
e685bdaf659a25a200e2b9e39e51ff03
0fc72cf1ce07232bd8b2be5e6c670143
f51e937e670eee09d4f2ea5a6e4e6996
5db852c275351b86fc4ca892d78ae002
d6f70d029bd79c4d1c26cf14e9588033
cf639f8a74809f29f72b9d58f9b8f5fe
fc7938eade40e9fed6cb92184abb2cc1
0eb1a296df243b251df0643d53724cdb
5a92a1d6cb817804c4a9319b57d53be5
80815bcfcb2df55018cc83fc43bc7ff8
2d51f9b88364776ee9d12fc85cc7ea5b
9741c4f598c485316db066d52db4540e
212e1518a9bd4828219e24b20d88f598
a196c9de96012090e333519ae18d3509
9427e7b372d348d352dc4c85e18cd4b9
3f8a56ddb2e64eb67adfc9b337157ff4
-----END OpenVPN Static key V1-----
</tls-auth>
 
Top