Quantcast
Channel: Active questions tagged openvpn - Unix & Linux Stack Exchange
Viewing all articles
Browse latest Browse all 825

OpenWrt rebooting after start the openvpn client

$
0
0

After starting openvpn (client), after a few seconds (from 2 to 40), OpenWRT reboots. How to find out why?

I connected to the server with android and linux, everything works without problems.

I changed UCP to TCP, turned off the firewall, turned off compression, stopped the dev parameter in the tap value. The result did not change.

It seems that OpenWRT rebooted after sending data via vpn. For example, ping instantly killed the system. With inaction, the system could not restart for 30-40 seconds. Although most often this happens immediately after connecting.

Client

# ubus call system board

{"kernel": "3.10.49","hostname": "UnwiredOne","system": "Atheros AR9330 rev 1","model": "Unwired Devices Unwired One board","release": {"distribution": "OpenWrt","version": "Barrier Breaker","revision": "r47068","codename": "barrier_breaker","target": "ar71xx\/generic","description": "OpenWrt Barrier Breaker 14.07"        }}

# openvpn --version

OpenVPN 2.3.6 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jan  6 2015library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

# cat client.ovpn

clientdev tunproto udpremote X.X.X.X 1194resolv-retry infinitenobinduser nobodygroup nogrouppersist-keypersist-tunremote-cert-tls servercomp-lzoverb 5key-direction 1script-security 2up /etc/openvpn/update-resolv-confdown /etc/openvpn/update-resolv-conf<ca>...</ca><cert>...</cert><key>...</key><tls-auth>...</tls-auth>

# openvpn /etc/openvpn/client1.ovpn

Wed Apr  1 18:20:38 2020 us=777485 OpenVPN 2.3.6 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jan  6 2015Wed Apr  1 18:20:38 2020 us=779657 library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08Wed Apr  1 18:20:38 2020 us=781988 NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsWed Apr  1 18:20:38 2020 us=793715 Control Channel Authentication: tls-auth using INLINE static key fileWed Apr  1 18:20:38 2020 us=795928 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationWed Apr  1 18:20:38 2020 us=798144 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationWed Apr  1 18:20:38 2020 us=800536 LZO compression initializedWed Apr  1 18:20:38 2020 us=804739 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]Wed Apr  1 18:20:38 2020 us=807505 Socket Buffers: R=[163840->131072] S=[163840->131072]Wed Apr  1 18:20:38 2020 us=810551 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]Wed Apr  1 18:20:38 2020 us=812971 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delayWed Apr  1 18:20:38 2020 us=815006 UDPv4 link local: [undef]Wed Apr  1 18:20:38 2020 us=816983 UDPv4 link remote: [AF_INET]Y.Y.Y.Y:1194WRWed Apr  1 18:20:38 2020 us=875520 TLS: Initial packet from [AF_INET]Y.Y.Y.Y:1194, sid=b83823a2 5303a60fWWWRRWRWed Apr  1 18:20:38 2020 us=983372 VERIFY OK: depth=1, CN=Easy-RSA CAWed Apr  1 18:20:38 2020 us=994932 Validating certificate key usageWed Apr  1 18:20:38 2020 us=996835 ++ Certificate has key usage  00a0, expects 00a0Wed Apr  1 18:20:38 2020 us=998078 VERIFY KU OKWed Apr  1 18:20:39 2020 us=953 Validating certificate extended key usageWed Apr  1 18:20:39 2020 us=2925 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationWed Apr  1 18:20:39 2020 us=5158 VERIFY EKU OKWed Apr  1 18:20:39 2020 us=7180 VERIFY OK: depth=0, CN=serverWRWWWWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRRRRWWWRRRWed Apr  1 18:20:41 2020 us=626297 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit keyWed Apr  1 18:20:41 2020 us=628023 NOTE: --mute triggered...WWed Apr  1 18:20:41 2020 us=633022 4 variation(s) on previous 10 message(s) suppressed by --muteWed Apr  1 18:20:41 2020 us=634789 [server] Peer Connection Initiated with [AF_INET]Y.Y.Y.Y:1194Wed Apr  1 18:20:43 2020 us=978684 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)WRRWed Apr  1 18:20:44 2020 us=32029 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'Wed Apr  1 18:20:44 2020 us=34675 OPTIONS IMPORT: timers and/or timeouts modifiedWed Apr  1 18:20:44 2020 us=36502 OPTIONS IMPORT: --ifconfig/up options modifiedWed Apr  1 18:20:44 2020 us=37438 OPTIONS IMPORT: route options modifiedWed Apr  1 18:20:44 2020 us=47521 TUN/TAP device tun0 openedWed Apr  1 18:20:44 2020 us=49579 TUN/TAP TX queue length set to 100Wed Apr  1 18:20:44 2020 us=51504 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Wed Apr  1 18:20:44 2020 us=52054 /sbin/ifconfig tun0 10.8.0.6 pointopoint 10.8.0.5 mtu 1500Wed Apr  1 18:20:44 2020 us=108306 /etc/openvpn/update-resolv-conf tun0 1500 1542 10.8.0.6 10.8.0.5 initWed Apr  1 18:20:44 2020 us=250005 /sbin/route add -net Y.Y.Y.Y netmask 255.255.255.255 gw 192.168.1.1Wed Apr  1 18:20:44 2020 us=300169 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.5Wed Apr  1 18:20:44 2020 us=339965 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.5Wed Apr  1 18:20:44 2020 us=383783 /sbin/route add -net 10.8.0.1 netmask 255.255.255.255 gw 10.8.0.5Wed Apr  1 18:20:44 2020 us=413375 GID set to nogroupWed Apr  1 18:20:44 2020 us=413776 UID set to nobodyWed Apr  1 18:20:44 2020 us=413997 Initialization Sequence CompletedWWRWRRWWRRWWRRW

Runtime Logging (OpenWRT)

Wed Apr  1 18:20:44 2020 daemon.notice netifd: Interface 'vpn0' is enabledWed Apr  1 18:20:44 2020 daemon.notice netifd: Network device 'tun0' link is upWed Apr  1 18:20:44 2020 daemon.notice netifd: Interface 'vpn0' has link connectivityWed Apr  1 18:20:44 2020 daemon.notice netifd: Interface 'vpn0' is setting up nowWed Apr  1 18:20:44 2020 daemon.notice netifd: Interface 'vpn0' is now upWed Apr  1 18:20:44 2020 daemon.info dnsmasq[1236]: exiting on receipt of SIGTERMWed Apr  1 18:20:44 2020 user.notice firewall: Reloading firewall due to ifup of vpn0 (tun0)Wed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: started, version 2.71 cachesize 150Wed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSECWed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: using nameserver 8.8.4.4#53Wed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: using nameserver 8.8.8.8#53Wed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: reading /etc/resolv.confWed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: using nameserver 8.8.4.4#53Wed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: using nameserver 8.8.8.8#53Wed Apr  1 18:20:45 2020 daemon.warn dnsmasq[4173]: ignoring nameserver 127.0.0.1 - local interfaceWed Apr  1 18:20:45 2020 daemon.info dnsmasq[4173]: read /etc/hosts - 1 addressesWed Apr  1 18:20:46 2020 daemon.info dnsmasq[4173]: exiting on receipt of SIGTERMWed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: started, version 2.71 cachesize 150Wed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSECWed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using local addresses only for domain lanWed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using nameserver 8.8.4.4#53Wed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using nameserver 8.8.8.8#53Wed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: reading /tmp/resolv.conf.vpnWed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using local addresses only for domain lanWed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using nameserver 8.8.4.4#53Wed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using nameserver 8.8.8.8#53Wed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using nameserver 209.244.0.3#53Wed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: using nameserver 64.6.64.6#53Wed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: read /etc/hosts - 1 addressesWed Apr  1 18:20:46 2020 daemon.info dnsmasq[4192]: read /tmp/hosts/dhcp - 0 addressesWed Apr  1 14:30:28 2020 user.emerg syslog: this file has been obseleted. please call "/sbin/block mount" directlyWed Apr  1 14:30:28 2020 user.err syslog: /dev/mtdblock5 is already mountedWed Apr  1 14:30:28 2020 user.emerg syslog: block: /dev/mtdblock5 is already mountedWed Apr  1 14:30:30 2020 authpriv.warn dropbear[1008]: Failed loading /etc/dropbear/dropbear_ecdsa_host_keyWed Apr  1 14:30:30 2020 authpriv.info dropbear[1008]: Not backgroundingWed Apr  1 14:30:35 2020 auth.err sshd[1021]: error: Bind to port 22 on :: failed: Address already in use.Wed Apr  1 14:30:35 2020 auth.err sshd[1021]: error: Bind to port 22 on 0.0.0.0 failed: Address already in use.Wed Apr  1 14:30:35 2020 auth.crit sshd[1021]: fatal: Cannot bind any address.Wed Apr  1 14:30:35 2020 daemon.warn netifd: You have delegated IPv6-prefixes but haven't assigned them to any interface. Did you forget to set option ip6assign on your lan-interfaces?Wed Apr  1 14:30:35 2020 daemon.notice netifd: Interface '3g' is setting up nowWed Apr  1 14:30:35 2020 daemon.notice netifd: Interface 'loopback' is enabledWed Apr  1 14:30:35 2020 daemon.notice netifd: Interface 'loopback' is setting up nowWed Apr  1 14:30:35 2020 daemon.notice netifd: Interface 'loopback' is now upWed Apr  1 14:30:35 2020 daemon.notice netifd: Network device 'lo' link is upWed Apr  1 14:30:35 2020 daemon.notice netifd: Interface 'loopback' has link connectivity

Server

# lsb_release -aNo LSB modules are available.Distributor ID: UbuntuDescription:    Ubuntu 16.04 LTSRelease:        16.04Codename:       xenial

# openvpn --version

OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jan  9 2019library versions: OpenSSL 1.0.2g-fips  1 Mar 2016, LZO 2.08# cat /etc/openvpn/server.confport 1194proto udpdev tunca /etc/openvpn/ca.crtcert /etc/openvpn/server.crtkey /etc/openvpn/server.keydh /etc/openvpn/dh.pemserver 10.8.0.0 255.255.255.0ifconfig-pool-persist ipp.txtpush "redirect-gateway def1 bypass-dhcp"keepalive 10 120tls-auth /etc/openvpn/ta.keycomp-lzouser nobodygroup nogrouppersist-keypersist-tunstatus openvpn-status.logverb 5mute 10

# sudo openvpn --config /etc/openvpn/server.conf

Wed Apr  1 18:18:50 2020 us=544920 Current Parameter Settings:Wed Apr  1 18:18:50 2020 us=544980   config = '/etc/openvpn/server.conf'Wed Apr  1 18:18:50 2020 us=545008   mode = 1Wed Apr  1 18:18:50 2020 us=545018   persist_config = DISABLEDWed Apr  1 18:18:50 2020 us=545027   persist_mode = 1Wed Apr  1 18:18:50 2020 us=545036   show_ciphers = DISABLEDWed Apr  1 18:18:50 2020 us=545045   show_digests = DISABLEDWed Apr  1 18:18:50 2020 us=545054   show_engines = DISABLEDWed Apr  1 18:18:50 2020 us=545065   genkey = DISABLEDWed Apr  1 18:18:50 2020 us=545074   key_pass_file = '[UNDEF]'Wed Apr  1 18:18:50 2020 us=545083 NOTE: --mute triggered...Wed Apr  1 18:18:50 2020 us=545101 272 variation(s) on previous 10 message(s) suppressed by --muteWed Apr  1 18:18:50 2020 us=545111 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jan  9 2019Wed Apr  1 18:18:50 2020 us=545137 library versions: OpenSSL 1.0.2g-fips  1 Mar 2016, LZO 2.08Wed Apr  1 18:18:50 2020 us=545527 Diffie-Hellman initialized with 2048 bit keyWed Apr  1 18:18:50 2020 us=545692 WARNING: file '/etc/openvpn/server.key' is group or others accessibleWed Apr  1 18:18:50 2020 us=545848 WARNING: file '/etc/openvpn/ta.key' is group or others accessibleWed Apr  1 18:18:50 2020 us=545877 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key fileWed Apr  1 18:18:50 2020 us=545889 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationWed Apr  1 18:18:50 2020 us=545899 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationWed Apr  1 18:18:50 2020 us=545914 TLS-Auth MTU parms [ L:1542 D:1184 EF:66 EB:0 ET:0 EL:3 ]Wed Apr  1 18:18:50 2020 us=545935 Socket Buffers: R=[133120->133120] S=[133120->133120]Wed Apr  1 18:18:50 2020 us=546010 ROUTE_GATEWAY ON_LINK IFACE=venet0 HWADDR=00:00:00:00:00:00Wed Apr  1 18:18:50 2020 us=547302 TUN/TAP device tun0 openedWed Apr  1 18:18:50 2020 us=547328 TUN/TAP TX queue length set to 100Wed Apr  1 18:18:50 2020 us=547361 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Wed Apr  1 18:18:50 2020 us=547384 /sbin/ip link set dev tun0 up mtu 1500Wed Apr  1 18:18:50 2020 us=556067 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2Wed Apr  1 18:18:50 2020 us=558129 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2Wed Apr  1 18:18:50 2020 us=560809 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:143 ET:0 EL:3 AF:3/1 ]Wed Apr  1 18:18:50 2020 us=561299 GID set to nogroupWed Apr  1 18:18:50 2020 us=561334 UID set to nobodyWed Apr  1 18:18:50 2020 us=561349 UDPv4 link local (bound): [undef]Wed Apr  1 18:18:50 2020 us=561359 UDPv4 link remote: [undef]Wed Apr  1 18:18:50 2020 us=561379 MULTI: multi_init called, r=256 v=256Wed Apr  1 18:18:50 2020 us=561412 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0Wed Apr  1 18:18:50 2020 us=561433 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6Wed Apr  1 18:18:50 2020 us=561445 succeeded -> ifconfig_pool_set()Wed Apr  1 18:18:50 2020 us=561454 ifconfig_pool_read(), in='client1,10.8.0.8', TODO: IPv6Wed Apr  1 18:18:50 2020 us=561466 succeeded -> ifconfig_pool_set()Wed Apr  1 18:18:50 2020 us=561477 IFCONFIG POOL LISTWed Apr  1 18:18:50 2020 us=561487 client1,10.8.0.4Wed Apr  1 18:18:50 2020 us=561496 client1,10.8.0.8Wed Apr  1 18:18:50 2020 us=561524 Initialization Sequence CompletedWed Apr  1 18:20:38 2020 us=841127 MULTI: multi_create_instance calledWed Apr  1 18:20:38 2020 us=841200 X.X.X.X:58811 Re-using SSL/TLS contextWed Apr  1 18:20:38 2020 us=841233 X.X.X.X:58811 LZO compression initializedWed Apr  1 18:20:38 2020 us=841331 X.X.X.X:58811 Control Channel MTU parms [ L:1542 D:1184 EF:66 EB:0 ET:0 EL:3 ]Wed Apr  1 18:20:38 2020 us=841345 X.X.X.X:58811 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:143 ET:0 EL:3 AF:3/1 ]Wed Apr  1 18:20:38 2020 us=841368 X.X.X.X:58811 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'Wed Apr  1 18:20:38 2020 us=841385 X.X.X.X:58811 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'Wed Apr  1 18:20:38 2020 us=841423 X.X.X.X:58811 Local Options hash (VER=V4): '6c76e362'Wed Apr  1 18:20:38 2020 us=841440 X.X.X.X:58811 Expected Remote Options hash (VER=V4): '2a06964e'RWed Apr  1 18:20:38 2020 us=841479 X.X.X.X:58811 TLS: Initial packet from [AF_INET]X.X.X.X:58811, sid=07269695 2a159032WRRWRWWWRRRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWed Apr  1 18:20:41 2020 us=388913 X.X.X.X:58811 VERIFY OK: depth=1, CN=Easy-RSA CAWed Apr  1 18:20:41 2020 us=389121 X.X.X.X:58811 VERIFY OK: depth=0, CN=client1WRWRWRWRWRWRWRWRWRWed Apr  1 18:20:41 2020 us=589321 X.X.X.X:58811 NOTE: Options consistency check may be skewed by version differencesWed Apr  1 18:20:41 2020 us=589371 X.X.X.X:58811 WARNING: 'version' is used inconsistently, local='version V4', remote='version V0 UNDEF'Wed Apr  1 18:20:41 2020 us=589395 X.X.X.X:58811 WARNING: 'dev-type' is present in local config but missing in remote config, local='dev-type tun'Wed Apr  1 18:20:41 2020 us=589445 X.X.X.X:58811 WARNING: 'link-mtu' is present in local config but missing in remote config, local='link-mtu 1542'Wed Apr  1 18:20:41 2020 us=589462 X.X.X.X:58811 WARNING: 'tun-mtu' is present in local config but missing in remote config, local='tun-mtu 1500'Wed Apr  1 18:20:41 2020 us=589495 X.X.X.X:58811 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'Wed Apr  1 18:20:41 2020 us=589528 X.X.X.X:58811 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1'Wed Apr  1 18:20:41 2020 us=589545 X.X.X.X:58811 WARNING: 'cipher' is present in local config but missing in remote config, local='cipher BF-CBC'Wed Apr  1 18:20:41 2020 us=589562 X.X.X.X:58811 WARNING: 'auth' is present in local config but missing in remote config, local='auth SHA1'Wed Apr  1 18:20:41 2020 us=589578 X.X.X.X:58811 WARNING: 'keysize' is present in local config but missing in remote config, local='keysize 128'Wed Apr  1 18:20:41 2020 us=589592 X.X.X.X:58811 NOTE: --mute triggered...Wed Apr  1 18:20:41 2020 us=589779 X.X.X.X:58811 3 variation(s) on previous 10 message(s) suppressed by --muteWed Apr  1 18:20:41 2020 us=589800 X.X.X.X:58811 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit keyWed Apr  1 18:20:41 2020 us=589817 X.X.X.X:58811 WARNING: this cipher's block size is less than 128 bit (64 bit).  Consider using a --cipher with a larger block size.Wed Apr  1 18:20:41 2020 us=589841 X.X.X.X:58811 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationWed Apr  1 18:20:41 2020 us=589897 X.X.X.X:58811 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit keyWed Apr  1 18:20:41 2020 us=589915 X.X.X.X:58811 WARNING: this cipher's block size is less than 128 bit (64 bit).  Consider using a --cipher with a larger block size.Wed Apr  1 18:20:41 2020 us=589933 X.X.X.X:58811 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationWRWed Apr  1 18:20:41 2020 us=654386 X.X.X.X:58811 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSAWed Apr  1 18:20:41 2020 us=654474 X.X.X.X:58811 [client1] Peer Connection Initiated with [AF_INET]X.X.X.X:58811Wed Apr  1 18:20:41 2020 us=654542 client1/X.X.X.X:58811 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)Wed Apr  1 18:20:41 2020 us=654612 client1/X.X.X.X:58811 MULTI: Learn: 10.8.0.6 -> client1/X.X.X.X:58811Wed Apr  1 18:20:41 2020 us=654657 client1/X.X.X.X:58811 MULTI: primary virtual IP for client1/X.X.X.X:58811: 10.8.0.6RWed Apr  1 18:20:44 2020 us=4168 client1/X.X.X.X:58811 PUSH: Received control message: 'PUSH_REQUEST'Wed Apr  1 18:20:44 2020 us=4203 client1/X.X.X.X:58811 send_push_reply(): safe_cap=940Wed Apr  1 18:20:44 2020 us=4232 client1/X.X.X.X:58811 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)WWRRWRWWRWRWRRWWRWWWWWWW

Viewing all articles
Browse latest Browse all 825

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>