COMMUNITY EDITION System Interfaces Firewall Services VPN Status Diagnostics Help StatusSystem LogsOpenVPN System Firewall DHCP Authentication IPsec PPP PPPoE/L2TP Server OpenVPN NTP Packages Settings Last 500 OpenVPN Log Entries. (Maximum 500) Mar 1 07:47:06 openvpn 55384 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:47:06 openvpn 55384 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:47:06 openvpn 55384 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:47:06 openvpn 55384 TUN/TAP device /dev/tun1 opened Mar 1 07:47:06 openvpn 55384 /sbin/ifconfig ovpnc1 10.8.2.7 10.8.2.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:47:06 openvpn 55384 /sbin/route add -net 10.8.2.0 10.8.2.1 255.255.255.0 Mar 1 07:47:06 openvpn 55384 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.2.7 255.255.255.0 init Mar 1 07:47:06 openvpn 55384 Initialization Sequence Completed Mar 1 07:47:09 openvpn 55384 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:47:09 openvpn 55384 MANAGEMENT: CMD 'state 1' Mar 1 07:47:09 openvpn 55384 MANAGEMENT: CMD 'status 2' Mar 1 07:47:09 openvpn 55384 MANAGEMENT: Client disconnected Mar 1 07:48:40 openvpn 29203 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 07:48:40 openvpn 29203 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 07:48:40 openvpn 29203 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 07:48:40 openvpn 29220 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 07:48:40 openvpn 29220 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 07:48:40 openvpn 29220 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 07:48:40 openvpn 29220 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:48:40 openvpn 29220 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:48:45 openvpn 29220 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.116:1194 Mar 1 07:48:45 openvpn 29220 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 07:48:45 openvpn 29220 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 07:48:45 openvpn 29220 UDPv4 link remote: [AF_INET]185.229.59.116:1194 Mar 1 07:48:45 openvpn 29220 TLS: Initial packet from [AF_INET]185.229.59.116:1194, sid=371df045 aef73a08 Mar 1 07:48:45 openvpn 29220 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 07:48:46 openvpn 29220 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9581.nordvpn.com Mar 1 07:48:46 openvpn 29220 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:48:46 openvpn 29220 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:48:46 openvpn 29220 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:48:46 openvpn 29220 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:48:46 openvpn 29220 VERIFY KU OK Mar 1 07:48:46 openvpn 29220 Validating certificate extended key usage Mar 1 07:48:46 openvpn 29220 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 07:48:46 openvpn 29220 VERIFY EKU OK Mar 1 07:48:46 openvpn 29220 VERIFY OK: depth=0, CN=us9581.nordvpn.com Mar 1 07:48:46 openvpn 29220 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' Mar 1 07:48:46 openvpn 29220 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 07:48:46 openvpn 29220 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 07:48:46 openvpn 29220 [us9581.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.116:1194 Mar 1 07:48:47 openvpn 29220 SENT CONTROL [us9581.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 07:48:47 openvpn 29220 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.13 255.255.255.0,peer-id 9' Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: compression parms modified Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 07:48:47 openvpn 29220 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: route options modified Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: route-related options modified Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: peer-id set Mar 1 07:48:47 openvpn 29220 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 07:48:47 openvpn 29220 Using peer cipher 'AES-256-CBC' Mar 1 07:48:47 openvpn 29220 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:48:47 openvpn 29220 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:48:47 openvpn 29220 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:48:47 openvpn 29220 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:48:47 openvpn 29220 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:48:47 openvpn 29220 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:48:47 openvpn 29220 TUN/TAP device /dev/tun1 opened Mar 1 07:48:47 openvpn 29220 ioctl(TUNSIFMODE): Device busy (errno=16) Mar 1 07:48:47 openvpn 29220 /sbin/ifconfig ovpnc1 10.8.0.13 10.8.0.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:48:47 openvpn 29220 /sbin/route add -net 10.8.0.0 10.8.0.1 255.255.255.0 Mar 1 07:48:47 openvpn 29220 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.0.13 255.255.255.0 init Mar 1 07:48:47 openvpn 29220 Initialization Sequence Completed Mar 1 07:50:10 openvpn 29220 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:50:10 openvpn 29220 MANAGEMENT: CMD 'state 1' Mar 1 07:50:10 openvpn 29220 MANAGEMENT: CMD 'status 2' Mar 1 07:50:10 openvpn 29220 MANAGEMENT: Client disconnected Mar 1 07:53:54 openvpn 29220 event_wait : Interrupted system call (code=4) Mar 1 07:53:54 openvpn 29220 SIGTERM received, sending exit notification to peer Mar 1 07:53:55 openvpn 29220 Closing TUN/TAP interface Mar 1 07:53:55 openvpn 29220 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1656 10.8.0.13 255.255.255.0 init Mar 1 07:53:55 openvpn 29220 SIGTERM[soft,exit-with-notification] received, process exiting Mar 1 07:53:55 openvpn 46170 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 07:53:55 openvpn 46170 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 07:53:55 openvpn 46170 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 07:53:55 openvpn 46240 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 07:53:55 openvpn 46240 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 07:53:55 openvpn 46240 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 07:53:55 openvpn 46240 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:53:55 openvpn 46240 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:53:55 openvpn 46240 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.116:1194 Mar 1 07:53:55 openvpn 46240 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 07:53:55 openvpn 46240 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 07:53:55 openvpn 46240 UDPv4 link remote: [AF_INET]185.229.59.116:1194 Mar 1 07:53:55 openvpn 46240 TLS: Initial packet from [AF_INET]185.229.59.116:1194, sid=7088364b 82c2a8de Mar 1 07:53:55 openvpn 46240 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 07:53:55 openvpn 46240 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9581.nordvpn.com Mar 1 07:53:55 openvpn 46240 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:53:55 openvpn 46240 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:53:55 openvpn 46240 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:53:55 openvpn 46240 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:53:55 openvpn 46240 VERIFY KU OK Mar 1 07:53:55 openvpn 46240 Validating certificate extended key usage Mar 1 07:53:55 openvpn 46240 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 07:53:55 openvpn 46240 VERIFY EKU OK Mar 1 07:53:55 openvpn 46240 VERIFY OK: depth=0, CN=us9581.nordvpn.com Mar 1 07:53:55 openvpn 46240 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1581', remote='link-mtu 1634' Mar 1 07:53:55 openvpn 46240 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA512' Mar 1 07:53:55 openvpn 46240 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 07:53:55 openvpn 46240 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 07:53:55 openvpn 46240 [us9581.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.116:1194 Mar 1 07:53:56 openvpn 46240 SENT CONTROL [us9581.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 07:53:56 openvpn 46240 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.2.4 255.255.255.0,peer-id 0' Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: compression parms modified Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 07:53:56 openvpn 46240 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: route options modified Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: route-related options modified Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: peer-id set Mar 1 07:53:56 openvpn 46240 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 07:53:56 openvpn 46240 Using peer cipher 'AES-256-CBC' Mar 1 07:53:56 openvpn 46240 Data Channel: using negotiated cipher 'AES-256-CBC' Mar 1 07:53:56 openvpn 46240 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:53:56 openvpn 46240 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:53:56 openvpn 46240 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:53:56 openvpn 46240 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:53:56 openvpn 46240 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:53:56 openvpn 46240 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:53:56 openvpn 46240 TUN/TAP device /dev/tun1 opened Mar 1 07:53:56 openvpn 46240 /sbin/ifconfig ovpnc1 10.8.2.4 10.8.2.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:53:56 openvpn 46240 /sbin/route add -net 10.8.2.0 10.8.2.1 255.255.255.0 Mar 1 07:53:56 openvpn 46240 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1636 10.8.2.4 255.255.255.0 init Mar 1 07:53:56 openvpn 46240 Initialization Sequence Completed Mar 1 07:54:04 openvpn 46240 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:54:04 openvpn 46240 MANAGEMENT: CMD 'state 1' Mar 1 07:54:04 openvpn 46240 MANAGEMENT: CMD 'status 2' Mar 1 07:54:04 openvpn 46240 MANAGEMENT: Client disconnected Mar 1 07:54:07 openvpn 46240 event_wait : Interrupted system call (code=4) Mar 1 07:54:07 openvpn 46240 SIGTERM received, sending exit notification to peer Mar 1 07:54:08 openvpn 46240 Closing TUN/TAP interface Mar 1 07:54:08 openvpn 46240 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1636 10.8.2.4 255.255.255.0 init Mar 1 07:54:08 openvpn 46240 SIGTERM[soft,exit-with-notification] received, process exiting Mar 1 07:54:08 openvpn 53282 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 07:54:08 openvpn 53282 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 07:54:08 openvpn 53282 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 07:54:08 openvpn 53411 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 07:54:08 openvpn 53411 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 07:54:08 openvpn 53411 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 07:54:08 openvpn 53411 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:08 openvpn 53411 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:08 openvpn 53411 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.116:1194 Mar 1 07:54:08 openvpn 53411 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 07:54:08 openvpn 53411 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 07:54:08 openvpn 53411 UDPv4 link remote: [AF_INET]185.229.59.116:1194 Mar 1 07:54:08 openvpn 53411 TLS: Initial packet from [AF_INET]185.229.59.116:1194, sid=14555301 d1d9e24e Mar 1 07:54:08 openvpn 53411 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 07:54:08 openvpn 53411 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9581.nordvpn.com Mar 1 07:54:08 openvpn 53411 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:54:08 openvpn 53411 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:54:08 openvpn 53411 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:54:08 openvpn 53411 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:54:08 openvpn 53411 VERIFY KU OK Mar 1 07:54:08 openvpn 53411 Validating certificate extended key usage Mar 1 07:54:08 openvpn 53411 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 07:54:08 openvpn 53411 VERIFY EKU OK Mar 1 07:54:08 openvpn 53411 VERIFY OK: depth=0, CN=us9581.nordvpn.com Mar 1 07:54:08 openvpn 53411 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1581', remote='link-mtu 1634' Mar 1 07:54:08 openvpn 53411 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA512' Mar 1 07:54:08 openvpn 53411 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 07:54:08 openvpn 53411 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 07:54:08 openvpn 53411 [us9581.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.116:1194 Mar 1 07:54:09 openvpn 53411 SENT CONTROL [us9581.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 07:54:09 openvpn 53411 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.3.21 255.255.255.0,peer-id 23' Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: compression parms modified Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 07:54:09 openvpn 53411 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: route options modified Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: route-related options modified Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: peer-id set Mar 1 07:54:09 openvpn 53411 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 07:54:09 openvpn 53411 Using peer cipher 'AES-256-CBC' Mar 1 07:54:09 openvpn 53411 Data Channel: using negotiated cipher 'AES-256-CBC' Mar 1 07:54:09 openvpn 53411 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:54:09 openvpn 53411 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:09 openvpn 53411 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:54:09 openvpn 53411 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:09 openvpn 53411 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:54:09 openvpn 53411 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:54:09 openvpn 53411 TUN/TAP device /dev/tun1 opened Mar 1 07:54:09 openvpn 53411 /sbin/ifconfig ovpnc1 10.8.3.21 10.8.3.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:54:09 openvpn 53411 /sbin/route add -net 10.8.3.0 10.8.3.1 255.255.255.0 Mar 1 07:54:09 openvpn 53411 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1636 10.8.3.21 255.255.255.0 init Mar 1 07:54:09 openvpn 53411 Initialization Sequence Completed Mar 1 07:54:13 openvpn 53411 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:54:13 openvpn 53411 MANAGEMENT: CMD 'state 1' Mar 1 07:54:13 openvpn 53411 MANAGEMENT: CMD 'status 2' Mar 1 07:54:13 openvpn 53411 MANAGEMENT: Client disconnected Mar 1 07:54:38 openvpn 53411 event_wait : Interrupted system call (code=4) Mar 1 07:54:38 openvpn 53411 SIGTERM received, sending exit notification to peer Mar 1 07:54:39 openvpn 53411 Closing TUN/TAP interface Mar 1 07:54:39 openvpn 53411 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1636 10.8.3.21 255.255.255.0 init Mar 1 07:54:39 openvpn 53411 SIGTERM[soft,exit-with-notification] received, process exiting Mar 1 07:54:39 openvpn 70170 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 07:54:39 openvpn 70170 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 07:54:39 openvpn 70170 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 07:54:39 openvpn 70240 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 07:54:39 openvpn 70240 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 07:54:39 openvpn 70240 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 07:54:39 openvpn 70240 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:39 openvpn 70240 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:39 openvpn 70240 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.116:1194 Mar 1 07:54:39 openvpn 70240 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 07:54:39 openvpn 70240 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 07:54:39 openvpn 70240 UDPv4 link remote: [AF_INET]185.229.59.116:1194 Mar 1 07:54:39 openvpn 70240 TLS: Initial packet from [AF_INET]185.229.59.116:1194, sid=896b07eb 45d52f78 Mar 1 07:54:39 openvpn 70240 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 07:54:39 openvpn 70240 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9581.nordvpn.com Mar 1 07:54:39 openvpn 70240 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:54:39 openvpn 70240 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:54:39 openvpn 70240 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:54:39 openvpn 70240 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:54:39 openvpn 70240 VERIFY KU OK Mar 1 07:54:39 openvpn 70240 Validating certificate extended key usage Mar 1 07:54:39 openvpn 70240 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 07:54:39 openvpn 70240 VERIFY EKU OK Mar 1 07:54:39 openvpn 70240 VERIFY OK: depth=0, CN=us9581.nordvpn.com Mar 1 07:54:39 openvpn 70240 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' Mar 1 07:54:39 openvpn 70240 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 07:54:39 openvpn 70240 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 07:54:39 openvpn 70240 [us9581.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.116:1194 Mar 1 07:54:41 openvpn 70240 SENT CONTROL [us9581.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 07:54:41 openvpn 70240 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.13 255.255.255.0,peer-id 9' Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: compression parms modified Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 07:54:41 openvpn 70240 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: route options modified Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: route-related options modified Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: peer-id set Mar 1 07:54:41 openvpn 70240 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 07:54:41 openvpn 70240 Using peer cipher 'AES-256-CBC' Mar 1 07:54:41 openvpn 70240 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:54:41 openvpn 70240 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:41 openvpn 70240 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:54:41 openvpn 70240 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:41 openvpn 70240 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:54:41 openvpn 70240 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:54:41 openvpn 70240 TUN/TAP device /dev/tun1 opened Mar 1 07:54:41 openvpn 70240 /sbin/ifconfig ovpnc1 10.8.0.13 10.8.0.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:54:41 openvpn 70240 /sbin/route add -net 10.8.0.0 10.8.0.1 255.255.255.0 Mar 1 07:54:41 openvpn 70240 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.0.13 255.255.255.0 init Mar 1 07:54:41 openvpn 70240 Initialization Sequence Completed Mar 1 07:54:45 openvpn 70240 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:54:45 openvpn 70240 MANAGEMENT: CMD 'state 1' Mar 1 07:54:45 openvpn 70240 MANAGEMENT: CMD 'status 2' Mar 1 07:54:45 openvpn 70240 MANAGEMENT: Client disconnected Mar 1 07:54:47 openvpn 70240 event_wait : Interrupted system call (code=4) Mar 1 07:54:47 openvpn 70240 SIGTERM received, sending exit notification to peer Mar 1 07:54:48 openvpn 70240 Closing TUN/TAP interface Mar 1 07:54:48 openvpn 70240 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1656 10.8.0.13 255.255.255.0 init Mar 1 07:54:48 openvpn 70240 SIGTERM[soft,exit-with-notification] received, process exiting Mar 1 07:54:48 openvpn 40016 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 07:54:48 openvpn 40016 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 07:54:48 openvpn 40016 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 07:54:48 openvpn 40162 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 07:54:48 openvpn 40162 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 07:54:48 openvpn 40162 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 07:54:48 openvpn 40162 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:48 openvpn 40162 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:48 openvpn 40162 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.116:1194 Mar 1 07:54:48 openvpn 40162 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 07:54:48 openvpn 40162 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 07:54:48 openvpn 40162 UDPv4 link remote: [AF_INET]185.229.59.116:1194 Mar 1 07:54:48 openvpn 40162 TLS: Initial packet from [AF_INET]185.229.59.116:1194, sid=a81f6499 e0ebba4a Mar 1 07:54:48 openvpn 40162 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 07:54:48 openvpn 40162 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9581.nordvpn.com Mar 1 07:54:48 openvpn 40162 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:54:48 openvpn 40162 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:54:48 openvpn 40162 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:54:48 openvpn 40162 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:54:48 openvpn 40162 VERIFY KU OK Mar 1 07:54:48 openvpn 40162 Validating certificate extended key usage Mar 1 07:54:48 openvpn 40162 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 07:54:48 openvpn 40162 VERIFY EKU OK Mar 1 07:54:48 openvpn 40162 VERIFY OK: depth=0, CN=us9581.nordvpn.com Mar 1 07:54:48 openvpn 40162 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' Mar 1 07:54:48 openvpn 40162 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 07:54:48 openvpn 40162 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 07:54:48 openvpn 40162 [us9581.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.116:1194 Mar 1 07:54:49 openvpn 40162 SENT CONTROL [us9581.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 07:54:49 openvpn 40162 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.13 255.255.255.0,peer-id 9' Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: compression parms modified Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 07:54:49 openvpn 40162 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: route options modified Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: route-related options modified Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: peer-id set Mar 1 07:54:49 openvpn 40162 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 07:54:49 openvpn 40162 Using peer cipher 'AES-256-CBC' Mar 1 07:54:49 openvpn 40162 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:54:49 openvpn 40162 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:49 openvpn 40162 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:54:49 openvpn 40162 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:54:49 openvpn 40162 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:54:49 openvpn 40162 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:54:49 openvpn 40162 TUN/TAP device /dev/tun1 opened Mar 1 07:54:49 openvpn 40162 /sbin/ifconfig ovpnc1 10.8.0.13 10.8.0.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:54:49 openvpn 40162 /sbin/route add -net 10.8.0.0 10.8.0.1 255.255.255.0 Mar 1 07:54:49 openvpn 40162 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.0.13 255.255.255.0 init Mar 1 07:54:49 openvpn 40162 Initialization Sequence Completed Mar 1 07:54:53 openvpn 40162 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:54:53 openvpn 40162 MANAGEMENT: CMD 'state 1' Mar 1 07:54:53 openvpn 40162 MANAGEMENT: CMD 'status 2' Mar 1 07:54:53 openvpn 40162 MANAGEMENT: Client disconnected Mar 1 07:58:03 openvpn 40162 event_wait : Interrupted system call (code=4) Mar 1 07:58:03 openvpn 40162 SIGTERM received, sending exit notification to peer Mar 1 07:58:04 openvpn 40162 Closing TUN/TAP interface Mar 1 07:58:04 openvpn 40162 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1656 10.8.0.13 255.255.255.0 init Mar 1 07:58:04 openvpn 40162 SIGTERM[soft,exit-with-notification] received, process exiting Mar 1 07:58:04 openvpn 46462 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 07:58:04 openvpn 46462 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 07:58:04 openvpn 46462 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 07:58:04 openvpn 46480 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 07:58:04 openvpn 46480 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 07:58:04 openvpn 46480 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 07:58:04 openvpn 46480 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:04 openvpn 46480 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:04 openvpn 46480 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.102:1194 Mar 1 07:58:04 openvpn 46480 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 07:58:04 openvpn 46480 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 07:58:04 openvpn 46480 UDPv4 link remote: [AF_INET]185.229.59.102:1194 Mar 1 07:58:04 openvpn 46480 TLS: Initial packet from [AF_INET]185.229.59.102:1194, sid=12ac46b2 a6c6841d Mar 1 07:58:04 openvpn 46480 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 07:58:04 openvpn 46480 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9574.nordvpn.com Mar 1 07:58:04 openvpn 46480 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:58:04 openvpn 46480 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:58:04 openvpn 46480 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:58:04 openvpn 46480 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:58:04 openvpn 46480 VERIFY KU OK Mar 1 07:58:04 openvpn 46480 Validating certificate extended key usage Mar 1 07:58:04 openvpn 46480 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 07:58:04 openvpn 46480 VERIFY EKU OK Mar 1 07:58:04 openvpn 46480 VERIFY OK: depth=0, CN=us9574.nordvpn.com Mar 1 07:58:04 openvpn 46480 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' Mar 1 07:58:04 openvpn 46480 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 07:58:04 openvpn 46480 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 07:58:04 openvpn 46480 [us9574.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.102:1194 Mar 1 07:58:05 openvpn 46480 SENT CONTROL [us9574.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 07:58:05 openvpn 46480 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.3.9 255.255.255.0,peer-id 9' Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: compression parms modified Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 07:58:05 openvpn 46480 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: route options modified Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: route-related options modified Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: peer-id set Mar 1 07:58:05 openvpn 46480 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 07:58:05 openvpn 46480 Using peer cipher 'AES-256-CBC' Mar 1 07:58:05 openvpn 46480 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:58:05 openvpn 46480 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:05 openvpn 46480 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:58:05 openvpn 46480 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:05 openvpn 46480 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:58:05 openvpn 46480 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:58:05 openvpn 46480 TUN/TAP device /dev/tun1 opened Mar 1 07:58:05 openvpn 46480 /sbin/ifconfig ovpnc1 10.8.3.9 10.8.3.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:58:05 openvpn 46480 /sbin/route add -net 10.8.3.0 10.8.3.1 255.255.255.0 Mar 1 07:58:05 openvpn 46480 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.3.9 255.255.255.0 init Mar 1 07:58:05 openvpn 46480 Initialization Sequence Completed Mar 1 07:58:11 openvpn 46480 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:58:11 openvpn 46480 MANAGEMENT: CMD 'state 1' Mar 1 07:58:11 openvpn 46480 MANAGEMENT: CMD 'status 2' Mar 1 07:58:11 openvpn 46480 MANAGEMENT: Client disconnected Mar 1 07:58:14 openvpn 46480 event_wait : Interrupted system call (code=4) Mar 1 07:58:14 openvpn 46480 SIGTERM received, sending exit notification to peer Mar 1 07:58:15 openvpn 46480 Closing TUN/TAP interface Mar 1 07:58:15 openvpn 46480 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1656 10.8.3.9 255.255.255.0 init Mar 1 07:58:15 openvpn 46480 SIGTERM[soft,exit-with-notification] received, process exiting Mar 1 07:58:15 openvpn 33074 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 07:58:15 openvpn 33074 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 07:58:15 openvpn 33074 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 07:58:15 openvpn 33256 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 07:58:15 openvpn 33256 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 07:58:15 openvpn 33256 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 07:58:15 openvpn 33256 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:15 openvpn 33256 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:15 openvpn 33256 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.102:1194 Mar 1 07:58:15 openvpn 33256 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 07:58:15 openvpn 33256 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 07:58:15 openvpn 33256 UDPv4 link remote: [AF_INET]185.229.59.102:1194 Mar 1 07:58:15 openvpn 33256 TLS: Initial packet from [AF_INET]185.229.59.102:1194, sid=59b80252 850f947b Mar 1 07:58:15 openvpn 33256 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 07:58:15 openvpn 33256 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9574.nordvpn.com Mar 1 07:58:15 openvpn 33256 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:58:15 openvpn 33256 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:58:15 openvpn 33256 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 07:58:15 openvpn 33256 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 07:58:15 openvpn 33256 VERIFY KU OK Mar 1 07:58:15 openvpn 33256 Validating certificate extended key usage Mar 1 07:58:15 openvpn 33256 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 07:58:15 openvpn 33256 VERIFY EKU OK Mar 1 07:58:15 openvpn 33256 VERIFY OK: depth=0, CN=us9574.nordvpn.com Mar 1 07:58:15 openvpn 33256 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' Mar 1 07:58:15 openvpn 33256 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 07:58:15 openvpn 33256 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 07:58:15 openvpn 33256 [us9574.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.102:1194 Mar 1 07:58:16 openvpn 33256 SENT CONTROL [us9574.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 07:58:16 openvpn 33256 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.18 255.255.255.0,peer-id 16' Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: compression parms modified Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 07:58:16 openvpn 33256 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: route options modified Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: route-related options modified Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: peer-id set Mar 1 07:58:16 openvpn 33256 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 07:58:16 openvpn 33256 Using peer cipher 'AES-256-CBC' Mar 1 07:58:16 openvpn 33256 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:58:16 openvpn 33256 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:16 openvpn 33256 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 07:58:16 openvpn 33256 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 07:58:16 openvpn 33256 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 07:58:16 openvpn 33256 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 07:58:16 openvpn 33256 TUN/TAP device /dev/tun1 opened Mar 1 07:58:16 openvpn 33256 /sbin/ifconfig ovpnc1 10.8.0.18 10.8.0.1 mtu 1500 netmask 255.255.255.0 up Mar 1 07:58:16 openvpn 33256 /sbin/route add -net 10.8.0.0 10.8.0.1 255.255.255.0 Mar 1 07:58:16 openvpn 33256 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.0.18 255.255.255.0 init Mar 1 07:58:16 openvpn 33256 Initialization Sequence Completed Mar 1 07:58:20 openvpn 33256 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock Mar 1 07:58:20 openvpn 33256 MANAGEMENT: CMD 'state 1' Mar 1 07:58:20 openvpn 33256 MANAGEMENT: CMD 'status 2' Mar 1 07:58:20 openvpn 33256 MANAGEMENT: Client disconnected Mar 1 08:00:48 openvpn 39094 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible Mar 1 08:00:48 openvpn 39094 OpenVPN 2.5.0 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Feb 5 2021 Mar 1 08:00:48 openvpn 39094 library versions: OpenSSL 1.1.1i-freebsd 8 Dec 2020, LZO 2.10 Mar 1 08:00:48 openvpn 39179 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock Mar 1 08:00:48 openvpn 39179 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 1 08:00:48 openvpn 39179 WARNING: experimental option --capath /var/etc/openvpn/client1/ca Mar 1 08:00:48 openvpn 39179 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 08:00:48 openvpn 39179 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 08:00:53 openvpn 39179 TCP/UDP: Preserving recently used remote address: [AF_INET]185.229.59.102:1194 Mar 1 08:00:53 openvpn 39179 Socket Buffers: R=[42080->42080] S=[57344->57344] Mar 1 08:00:53 openvpn 39179 UDPv4 link local (bound): [AF_INET]192.168.68.70:0 Mar 1 08:00:53 openvpn 39179 UDPv4 link remote: [AF_INET]185.229.59.102:1194 Mar 1 08:00:53 openvpn 39179 TLS: Initial packet from [AF_INET]185.229.59.102:1194, sid=b02b5006 9cf2bb7e Mar 1 08:00:53 openvpn 39179 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mar 1 08:00:53 openvpn 39179 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=us9574.nordvpn.com Mar 1 08:00:53 openvpn 39179 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 08:00:53 openvpn 39179 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 08:00:53 openvpn 39179 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Mar 1 08:00:53 openvpn 39179 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Mar 1 08:00:53 openvpn 39179 VERIFY KU OK Mar 1 08:00:53 openvpn 39179 Validating certificate extended key usage Mar 1 08:00:53 openvpn 39179 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 1 08:00:53 openvpn 39179 VERIFY EKU OK Mar 1 08:00:53 openvpn 39179 VERIFY OK: depth=0, CN=us9574.nordvpn.com Mar 1 08:00:53 openvpn 39179 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634' Mar 1 08:00:53 openvpn 39179 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo' Mar 1 08:00:53 openvpn 39179 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Mar 1 08:00:53 openvpn 39179 [us9574.nordvpn.com] Peer Connection Initiated with [AF_INET]185.229.59.102:1194 Mar 1 08:00:55 openvpn 39179 SENT CONTROL [us9574.nordvpn.com]: 'PUSH_REQUEST' (status=1) Mar 1 08:00:55 openvpn 39179 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.1.16 255.255.255.0,peer-id 14' Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: timers and/or timeouts modified Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: explicit notify parm(s) modified Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: compression parms modified Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 1 08:00:55 openvpn 39179 Socket Buffers: R=[42080->524288] S=[57344->524288] Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: --ifconfig/up options modified Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: route options modified Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: route-related options modified Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: peer-id set Mar 1 08:00:55 openvpn 39179 OPTIONS IMPORT: adjusting link_mtu to 1656 Mar 1 08:00:55 openvpn 39179 Using peer cipher 'AES-256-CBC' Mar 1 08:00:55 openvpn 39179 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 08:00:55 openvpn 39179 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 08:00:55 openvpn 39179 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mar 1 08:00:55 openvpn 39179 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication Mar 1 08:00:55 openvpn 39179 ROUTE_GATEWAY 192.168.68.1/255.255.255.0 IFACE=em0 HWADDR=4c:72:b9:27:1b:78 Mar 1 08:00:55 openvpn 39179 TUN/TAP device ovpnc1 exists previously, keep at program end Mar 1 08:00:55 openvpn 39179 TUN/TAP device /dev/tun1 opened Mar 1 08:00:55 openvpn 39179 ioctl(TUNSIFMODE): Device busy (errno=16) Mar 1 08:00:55 openvpn 39179 /sbin/ifconfig ovpnc1 10.8.1.16 10.8.1.1 mtu 1500 netmask 255.255.255.0 up Mar 1 08:00:55 openvpn 39179 /sbin/route add -net 10.8.1.0 10.8.1.1 255.255.255.0 Mar 1 08:00:55 openvpn 39179 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.1.16 255.255.255.0 init Mar 1 08:00:55 openvpn 39179 Initialization Sequence Completed pfSense is developed and maintained by Netgate. © ESF 2004 - 2022 View license.