Jump to content


Photo

Vpn met xtrend et8000 en openpli 6.2


  • Please log in to reply
130 replies to this topic

Re: Vpn met xtrend et8000 en openpli 6.2 #21 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 14:25

Het rare is dit heeft altijd goed gewerkt met openpli 4.We hadden dan beide de zelfde ip range. Ik kan als ik bij mijn oma ben ook gewoon mijn vuplus ultimo 4k thuis benaderen als ik op haar wifi zit en de vpn op mijn telefoon aan zet op.

 

Dat komt waarschijnlijk door de setting "clients gebruiken de VPN voor alle toegang" op je router, die forceert alle verkeer de VPN tunnel in. Maar blijkbaar gebeurd dat dus niet (meer) op de box van oma.

 

Log daar eens via de VPN op in, en voer dan het commando "ip route" uit, en post het resultaat hier?


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #22 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 14:27

En wellicht ook de openvpn configuratie file van de box van oma (even username en password er uit halen mocht je niet met een certificaat werken).


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #23 Egbertjan

  • Senior Member
  • 499 posts

+1
Neutral

Posted 18 November 2018 - 15:22

Dit krijg ik te zien als ik ip route doe via telnet op de box van mijn oma.

 

Attached File  ip route .png   187.16KB   4 downloads

 

Dit staat er in het config bestanden van de vpn

 

client
dev tun
proto tcp
remote (hier staat mijn eigen extrene ip adres)
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca.crt /etc/openvpn/ca.crt
cert client.crt /etc/openvpn/client.crt
key client.key /etc/openvpn/key client.crt
cipher AES-128-CBC
comp-lzo
verb 5

In het bezet van 2x VU+ Ultimo 4k 4TB HDD en 10TB HDD en een Vu plus duo4k SE zonder HDD .

3 Schotels met: 5w,0,8w,3e,4,8e,7e,9e,13e,16e,19,2e,23,5e,28,2e en 42e 

Ziggo Kabel.

Smartkaarten :Ziggo,Fransat ,TVR Roemenië,HD+, SRG/SSR,TNTSAT,TIVUSAT en TV Vlaanderen.


Re: Vpn met xtrend et8000 en openpli 6.2 #24 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 16:19

Precies, daar staat dus niks in over forced tunneling, je hebt dus zeer waarschijnlijk een split tunnel nu, en dat veroorzaakt het probleem.

 

Heb je nu op die box al in /var/log gekeken, hetzij een een specifieke openvpn logfile, hetzij in messages? OpenVPN logt met "verb 5" een heleboel, dat is een debug mode.

 

Als je die "forceer alle verkeer door de tunnel" optie op je router aanzet, dan moet die bij het opzetten van de tunnel een "push redirect-gateway..." sturen, en die komt of niet, of wordt genereerd.


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #25 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 16:23

p.s. Je kunt ook als je wilt die hele messages file even in PM naar me sturen, als je die niet publiek wilt hebben...


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #26 Egbertjan

  • Senior Member
  • 499 posts

+1
Neutral

Posted 18 November 2018 - 17:25

Dit staat er in de log file. Ik heb mijn externe ip adres weg gehaald.
 
 
Jan  1 01:00:17 et8000 syslog.info syslogd started: BusyBox v1.24.1
Jan  1 01:00:17 et8000 user.notice kernel: klogd started: BusyBox v1.24.1 (2018-05-08 13:39:50 CEST)
Jan  1 01:00:17 et8000 user.info kernel: [    0.054000] workingset: timestamp_bits=14 max_order=17 bucket_order=3
Jan  1 01:00:17 et8000 user.notice kernel: [    0.055000] NFS: Registering the id_resolver key type
Jan  1 01:00:17 et8000 user.notice kernel: [    0.055000] Key type id_resolver registered
Jan  1 01:00:17 et8000 user.notice kernel: [    0.055000] Key type id_legacy registered
Jan  1 01:00:17 et8000 user.info kernel: [    0.055000] nfs4filelayout_init: NFSv4 File Layout Driver Registering...
Jan  1 01:00:17 et8000 user.info kernel: [    0.055000] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
Jan  1 01:00:17 et8000 user.info kernel: [    0.055000] fuse init (API version 7.26)
Jan  1 01:00:17 et8000 user.info kernel: [    0.061000] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 253)
Jan  1 01:00:17 et8000 user.info kernel: [    0.061000] io scheduler noop registered
Jan  1 01:00:17 et8000 user.info kernel: [    0.061000] io scheduler cfq registered (default)
Jan  1 01:00:17 et8000 user.info kernel: [    0.061000] Serial: 8250/16550 driver, 4 ports, IRQ sharing disabled
Jan  1 01:00:17 et8000 user.info kernel: [    0.062000] serial8250.0: ttyS0 at MMIO 0x10406700 (irq = 52, base_baud = 5062500) is a 16550A
Jan  1 01:00:17 et8000 user.info kernel: [    0.062000] serial8250.0: ttyS1 at MMIO 0x10406740 (irq = 53, base_baud = 5062500) is a 16550A
Jan  1 01:00:17 et8000 user.info kernel: [    0.063000] serial8250.0: ttyS2 at MMIO 0x10406780 (irq = 54, base_baud = 5062500) is a 16550A
Jan  1 01:00:17 et8000 user.info kernel: [    0.069000] loop: module loaded
Jan  1 01:00:17 et8000 user.info kernel: [    0.069000] ahci ahci.0: SSS flag set, parallel bus scan disabled
Jan  1 01:00:17 et8000 user.info kernel: [    0.079000] ahci ahci.0: AHCI 0001.0300 32 slots 3 ports 6 Gbps 0x3 impl platform mode
Jan  1 01:00:17 et8000 user.info kernel: [    0.079000] ahci ahci.0: flags: ncq sntf stag clo pmp slum part 
Jan  1 01:00:17 et8000 user.info kernel: [    0.084000] scsi host0: ahci
Jan  1 01:00:17 et8000 user.info kernel: [    0.084000] scsi host1: ahci
Jan  1 01:00:17 et8000 user.info kernel: [    0.085000] scsi host2: ahci
Jan  1 01:00:17 et8000 user.notice kernel: [    0.085000] ata1: FORCE: PHY spd limit set to 3.0Gbps
Jan  1 01:00:17 et8000 user.info kernel: [    0.085000] ata1: SATA max UDMA/133 mmio [mem 0x10181000-0x10190fff] port 0x100 irq 33
Jan  1 01:00:17 et8000 user.notice kernel: [    0.085000] ata2: FORCE: PHY spd limit set to 3.0Gbps
Jan  1 01:00:17 et8000 user.info kernel: [    0.085000] ata2: SATA max UDMA/133 mmio [mem 0x10181000-0x10190fff] port 0x180 irq 33
Jan  1 01:00:17 et8000 user.info kernel: [    0.085000] ata3: DUMMY
Jan  1 01:00:17 et8000 user.info kernel: [    0.085000] brcmstb_nand: NAND controller driver is loaded
Jan  1 01:00:17 et8000 user.info kernel: [    0.086000] libphy: Fixed MDIO Bus: probed
Jan  1 01:00:17 et8000 user.debug kernel: [    0.086000] __clk_enable: network [1]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.086000] bcm7429_pm_network_enable 00
Jan  1 01:00:17 et8000 user.debug kernel: [    0.086000] __clk_enable: enet [1]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.086000] bcm40nm_pm_genet_enable 00
Jan  1 01:00:17 et8000 user.info kernel: [    0.088000] bcmgenet: configuring instance #0 for external RGMII
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] __clk_disable: enet [0]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] bcm40nm_pm_genet_disable 00
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] __clk_disable: network [0]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] bcm7429_pm_network_disable 00
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] __clk_enable: network [1]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] bcm7429_pm_network_enable 00
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] __clk_enable: moca_genet [1]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] bcm40nm_pm_genet1_enable 00
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] __clk_enable: moca [1]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.088000] bcm40nm_pm_moca_enable 00
Jan  1 01:00:17 et8000 user.info kernel: [    0.397000] ata1: SATA link down (SStatus 0 SControl 320)
Jan  1 01:00:17 et8000 user.err kernel: [    0.400000] ata1: exception Emask 0x10 SAct 0x0 SErr 0x4000000 action 0xe frozen
Jan  1 01:00:17 et8000 user.err kernel: [    0.400000] ata1: irq_stat 0x00000040, connection status changed
Jan  1 01:00:17 et8000 user.err kernel: [    0.400000] ata1: SError: { DevExch }
Jan  1 01:00:17 et8000 user.info kernel: [    0.400000] ata1: hard resetting link
Jan  1 01:00:17 et8000 user.err kernel: [    0.442000] No PHY detected, not registering interface:1
Jan  1 01:00:17 et8000 user.debug kernel: [    0.442000] __clk_disable: moca [0]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.442000] bcm40nm_pm_moca_disable 00
Jan  1 01:00:17 et8000 user.debug kernel: [    0.442000] __clk_disable: moca_genet [0]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.442000] bcm40nm_pm_genet1_disable 00
Jan  1 01:00:17 et8000 user.debug kernel: [    0.442000] __clk_disable: network [0]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.442000] bcm7429_pm_network_disable 00
Jan  1 01:00:17 et8000 user.warn kernel: [    0.450000] bcmgenet: probe of bcmgenet.1 failed with error -5
Jan  1 01:00:17 et8000 user.info kernel: [    0.450000] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Jan  1 01:00:17 et8000 user.debug kernel: [    0.450000] __clk_enable: usb [1]
Jan  1 01:00:17 et8000 user.debug kernel: [    0.450000] bcm40nm_pm_usb_enable 00
Jan  1 01:00:17 et8000 user.info kernel: [    0.450000] ehci-brcm ehci-brcm.0: Broadcom STB EHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.450000] ehci-brcm ehci-brcm.0: new USB bus registered, assigned bus number 1
Jan  1 01:00:17 et8000 user.info kernel: [    0.460000] ehci-brcm ehci-brcm.0: irq 56, io mem 0x10480300
Jan  1 01:00:17 et8000 user.info kernel: [    0.467000] ehci-brcm ehci-brcm.0: USB 0.0 started, EHCI 1.00
Jan  1 01:00:17 et8000 user.info kernel: [    0.467000] hub 1-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.467000] hub 1-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.467000] ehci-brcm ehci-brcm.1: Broadcom STB EHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.467000] ehci-brcm ehci-brcm.1: new USB bus registered, assigned bus number 2
Jan  1 01:00:17 et8000 user.info kernel: [    0.478000] ehci-brcm ehci-brcm.1: irq 57, io mem 0x10480500
Jan  1 01:00:17 et8000 user.info kernel: [    0.485000] ehci-brcm ehci-brcm.1: USB 0.0 started, EHCI 1.00
Jan  1 01:00:17 et8000 user.info kernel: [    0.485000] hub 2-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.485000] hub 2-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.485000] ehci-brcm ehci-brcm.2: Broadcom STB EHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.485000] ehci-brcm ehci-brcm.2: new USB bus registered, assigned bus number 3
Jan  1 01:00:17 et8000 user.info kernel: [    0.496000] ehci-brcm ehci-brcm.2: irq 61, io mem 0x10490300
Jan  1 01:00:17 et8000 user.info kernel: [    0.503000] ehci-brcm ehci-brcm.2: USB 0.0 started, EHCI 1.00
Jan  1 01:00:17 et8000 user.info kernel: [    0.503000] hub 3-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.503000] hub 3-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.503000] ehci-brcm ehci-brcm.3: Broadcom STB EHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.503000] ehci-brcm ehci-brcm.3: new USB bus registered, assigned bus number 4
Jan  1 01:00:17 et8000 user.info kernel: [    0.514000] ehci-brcm ehci-brcm.3: irq 62, io mem 0x10490500
Jan  1 01:00:17 et8000 user.info kernel: [    0.521000] ehci-brcm ehci-brcm.3: USB 0.0 started, EHCI 1.00
Jan  1 01:00:17 et8000 user.info kernel: [    0.521000] hub 4-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.521000] hub 4-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.521000] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Jan  1 01:00:17 et8000 user.info kernel: [    0.521000] ohci-brcm ohci-brcm.0: Broadcom STB OHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.522000] ohci-brcm ohci-brcm.0: new USB bus registered, assigned bus number 5
Jan  1 01:00:17 et8000 user.info kernel: [    0.522000] ohci-brcm ohci-brcm.0: irq 58, io mem 0x10480400
Jan  1 01:00:17 et8000 user.info kernel: [    0.588000] hub 5-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.588000] hub 5-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.588000] ohci-brcm ohci-brcm.1: Broadcom STB OHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.588000] ohci-brcm ohci-brcm.1: new USB bus registered, assigned bus number 6
Jan  1 01:00:17 et8000 user.info kernel: [    0.589000] ohci-brcm ohci-brcm.1: irq 59, io mem 0x10480600
Jan  1 01:00:17 et8000 user.info kernel: [    0.655000] hub 6-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.655000] hub 6-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.656000] ohci-brcm ohci-brcm.2: Broadcom STB OHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.656000] ohci-brcm ohci-brcm.2: new USB bus registered, assigned bus number 7
Jan  1 01:00:17 et8000 user.info kernel: [    0.656000] ohci-brcm ohci-brcm.2: irq 63, io mem 0x10490400
Jan  1 01:00:17 et8000 user.info kernel: [    0.701000] ata2: SATA link down (SStatus 0 SControl 320)
Jan  1 01:00:17 et8000 user.info kernel: [    0.722000] hub 7-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.722000] hub 7-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.722000] ohci-brcm ohci-brcm.3: Broadcom STB OHCI
Jan  1 01:00:17 et8000 user.info kernel: [    0.723000] ohci-brcm ohci-brcm.3: new USB bus registered, assigned bus number 8
Jan  1 01:00:17 et8000 user.info kernel: [    0.723000] ohci-brcm ohci-brcm.3: irq 64, io mem 0x10490600
Jan  1 01:00:17 et8000 user.info kernel: [    0.789000] hub 8-0:1.0: USB hub found
Jan  1 01:00:17 et8000 user.info kernel: [    0.789000] hub 8-0:1.0: 1 port detected
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] usbcore: registered new interface driver usb-storage
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] mousedev: PS/2 mouse device common for all mice
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] i2c /dev entries driver
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] usbcore: registered new interface driver btusb
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] sdhci: Secure Digital Host Controller Interface driver
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] sdhci: Copyright(c) Pierre Ossman
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] sdhci-pltfm: SDHCI platform and OF driver helper
Jan  1 01:00:17 et8000 user.info kernel: [    0.790000] sdhci-brcmstb sdhci-brcmstb.0: Enabling controller
Jan  1 01:00:17 et8000 user.warn kernel: [    0.791000] mmc0: Failed to set 32-bit DMA mask.
Jan  1 01:00:17 et8000 user.warn kernel: [    0.791000] mmc0: No suitable DMA available - falling back to PIO
Jan  1 01:00:17 et8000 user.info kernel: [    0.824000] mmc0: SDHCI controller on sdhci-brcmstb.0 [sdhci-brcmstb.0] using PIO
Jan  1 01:00:17 et8000 user.info kernel: [    0.824000] sdhci-brcmstb sdhci-brcmstb.1: Disabled by bootloader
Jan  1 01:00:17 et8000 user.info kernel: [    0.824000] hidraw: raw HID events driver (C) Jiri Kosina
Jan  1 01:00:17 et8000 user.info kernel: [    0.824000] usbcore: registered new interface driver usbhid
Jan  1 01:00:17 et8000 user.info kernel: [    0.824000] usbhid: USB HID core driver
Jan  1 01:00:17 et8000 user.info kernel: [    0.825000] NET: Registered protocol family 17
Jan  1 01:00:17 et8000 user.info kernel: [    0.826000] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
Jan  1 01:00:17 et8000 user.info kernel: [    0.826000] Bluetooth: HIDP socket layer initialized
Jan  1 01:00:17 et8000 user.notice kernel: [    0.826000] Key type dns_resolver registered
Jan  1 01:00:17 et8000 user.info kernel: [    0.826000] PM: CP0 COUNT/COMPARE frequency does not depend on divisor
Jan  1 01:00:17 et8000 user.info kernel: [    0.827000] EBI CS1: setting up NAND flash (primary)
Jan  1 01:00:17 et8000 user.info kernel: [    0.827000] nand: device found, Manufacturer ID: 0xec, Chip ID: 0xdc
Jan  1 01:00:17 et8000 user.info kernel: [    0.827000] nand: Samsung NAND 512MiB 3,3V 8-bit
Jan  1 01:00:17 et8000 user.info kernel: [    0.827000] nand: 512 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64
Jan  1 01:00:17 et8000 user.info kernel: [    0.827000] brcmnand brcmnand.0: 512MiB total, 128KiB blocks, 2KiB pages, 16B OOB, 8-bit, BCH-4
Jan  1 01:00:17 et8000 user.info kernel: [    0.827000] 
Jan  1 01:00:17 et8000 user.info kernel: [    0.827000] Bad block table found at page 262080, version 0x01
Jan  1 01:00:17 et8000 user.info kernel: [    0.828000] Bad block table found at page 262016, version 0x01
Jan  1 01:00:17 et8000 user.info kernel: [    0.828000] nand_read_bbt: bad block at 0x000000580000
Jan  1 01:00:17 et8000 user.info kernel: [    0.828000] nand_read_bbt: bad block at 0x000005380000
Jan  1 01:00:17 et8000 user.info kernel: [    0.828000] nand_read_bbt: bad block at 0x00000cbe0000
Jan  1 01:00:17 et8000 user.info kernel: [    0.828000] nand_read_bbt: bad block at 0x000016a00000
Jan  1 01:00:17 et8000 user.info kernel: [    0.828000] nand_read_bbt: bad block at 0x00001db00000
Jan  1 01:00:17 et8000 user.info kernel: [    0.828000] nand_read_bbt: bad block at 0x00001df20000
Jan  1 01:00:17 et8000 user.notice kernel: [    0.829000] Creating 3 MTD partitions on "brcmnand.0":
Jan  1 01:00:17 et8000 user.notice kernel: [    0.829000] 0x000000000000-0x000020000000 : "complete"
Jan  1 01:00:17 et8000 user.notice kernel: [    0.832000] 0x000000000000-0x000000600000 : "kernel"
Jan  1 01:00:17 et8000 user.notice kernel: [    0.833000] 0x000000600000-0x000020000000 : "rootfs"
Jan  1 01:00:17 et8000 user.info kernel: [    0.836000] EBI CS0: setting up SPI flash
Jan  1 01:00:17 et8000 user.warn kernel: [    0.837000] brcm_setup_spi_flash: can't locate SPI master
Jan  1 01:00:17 et8000 user.warn kernel: [    0.837000] brcm_setup_cs: can't register SPI flash (error -19)
Jan  1 01:00:17 et8000 user.notice kernel: [    0.837000] ubi0: default fastmap pool size: 200
Jan  1 01:00:17 et8000 user.notice kernel: [    0.837000] ubi0: default fastmap WL pool size: 100
Jan  1 01:00:17 et8000 user.notice kernel: [    0.837000] ubi0: attaching mtd2
Jan  1 01:00:17 et8000 user.notice kernel: [    1.101000] ubi0: attached by fastmap
Jan  1 01:00:17 et8000 user.notice kernel: [    1.101000] ubi0: fastmap pool size: 200
Jan  1 01:00:17 et8000 user.notice kernel: [    1.101000] ubi0: fastmap WL pool size: 100
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: attached mtd2 (name "rootfs", size 506 MiB)
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: good PEBs: 4039, bad PEBs: 9, corrupted PEBs: 0
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: user volume: 1, internal volumes: 1, max. volumes count: 128
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: max/mean erase counter: 3/0, WL threshold: 4096, image sequence number: 1428988142
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: available PEBs: 0, total reserved PEBs: 4039, PEBs reserved for bad PEB handling: 71
Jan  1 01:00:17 et8000 user.notice kernel: [    1.113000] ubi0: background thread "ubi_bgt0d" started, PID 87
Jan  1 01:00:17 et8000 user.info kernel: [    1.113000] ALSA device list:
Jan  1 01:00:17 et8000 user.info kernel: [    1.113000]   No soundcards found.
Jan  1 01:00:17 et8000 user.err kernel: [    1.113000] Warning: unable to open an initial console.
Jan  1 01:00:17 et8000 user.notice kernel: [    1.115000] UBIFS (ubi0:0): background thread "ubifs_bgt0_0" started, PID 88
Jan  1 01:00:17 et8000 user.notice kernel: [    1.154000] UBIFS (ubi0:0): recovery needed
Jan  1 01:00:17 et8000 user.info kernel: [    1.165000] usb 8-1: new full-speed USB device number 2 using ohci-brcm
Jan  1 01:00:17 et8000 user.info kernel: [    1.289000] ata1: SATA link up 3.0 Gbps (SStatus 123 SControl 320)
Jan  1 01:00:17 et8000 user.info kernel: [    1.295000] ata1.00: ATA-7: SAMSUNG HD322HJ, 1AC01118, max UDMA7
Jan  1 01:00:17 et8000 user.info kernel: [    1.295000] ata1.00: 625142448 sectors, multi 0: LBA48 NCQ (depth 31/32)
Jan  1 01:00:17 et8000 user.info kernel: [    1.301000] ata1.00: configured for UDMA/133
Jan  1 01:00:17 et8000 user.info kernel: [    1.301000] ata1: EH complete
Jan  1 01:00:17 et8000 user.notice kernel: [    1.302000] scsi 0:0:0:0: Direct-Access     ATA      SAMSUNG HD322HJ  1118 PQ: 0 ANSI: 5
Jan  1 01:00:17 et8000 user.notice kernel: [    1.310000] sd 0:0:0:0: Attached scsi generic sg0 type 0
Jan  1 01:00:17 et8000 user.notice kernel: [    1.310000] sd 0:0:0:0: [sda] 625142448 512-byte logical blocks: (320 GB/298 GiB)
Jan  1 01:00:17 et8000 user.notice kernel: [    1.310000] sd 0:0:0:0: [sda] Write Protect is off
Jan  1 01:00:17 et8000 user.debug kernel: [    1.310000] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
Jan  1 01:00:17 et8000 user.notice kernel: [    1.310000] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Jan  1 01:00:17 et8000 user.info kernel: [    1.315000]  sda: sda1
Jan  1 01:00:17 et8000 user.notice kernel: [    1.316000] sd 0:0:0:0: [sda] Attached SCSI disk
Jan  1 01:00:17 et8000 user.notice kernel: [    1.349000] UBIFS (ubi0:0): recovery completed
Jan  1 01:00:17 et8000 user.notice kernel: [    1.349000] UBIFS (ubi0:0): UBIFS: mounted UBI device 0, volume 0, name "rootfs"
Jan  1 01:00:17 et8000 user.notice kernel: [    1.349000] UBIFS (ubi0:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes
Jan  1 01:00:17 et8000 user.notice kernel: [    1.349000] UBIFS (ubi0:0): FS size: 501682176 bytes (478 MiB, 3951 LEBs), journal size 9023488 bytes (8 MiB, 72 LEBs)
Jan  1 01:00:17 et8000 user.notice kernel: [    1.349000] UBIFS (ubi0:0): reserved for root: 0 bytes (0 KiB)
Jan  1 01:00:17 et8000 user.notice kernel: [    1.349000] UBIFS (ubi0:0): media format: w4/r0 (latest is w5/r0), UUID 204EDFB5-70D2-4291-B44B-4FDD3463F7B6, small LPT model
Jan  1 01:00:17 et8000 user.info kernel: [    1.351000] VFS: Mounted root (ubifs filesystem) on device 0:12.
Jan  1 01:00:17 et8000 user.info kernel: [    1.352000] devtmpfs: mounted
Jan  1 01:00:17 et8000 user.info kernel: [    1.352000] Freeing unused kernel memory: 284K
Jan  1 01:00:17 et8000 user.warn kernel: [    1.352000] This architecture does not have kernel memory protection.
Jan  1 01:00:17 et8000 user.notice kernel: [    1.496000] random: crng init done
Jan  1 01:00:17 et8000 user.info kernel: [    1.979000] EXT4-fs (sda1): recovery complete
Jan  1 01:00:17 et8000 user.info kernel: [    2.009000] EXT4-fs (sda1): mounted filesystem with ordered data mode. Opts: (null)
Jan  1 01:00:17 et8000 user.warn kernel: [    2.154000] tpm: loading out-of-tree module taints kernel.
Jan  1 01:00:17 et8000 user.info kernel: [    2.157000] usbcore: registered new interface driver tpm
Jan  1 01:00:17 et8000 user.warn kernel: [    5.215000] dvb: module_layout: kernel tainted.
Jan  1 01:00:17 et8000 user.warn kernel: [    5.215000] Disabling lock debugging due to kernel taint
Jan  1 01:00:17 et8000 user.info kernel: [    7.984000] input: dreambox remote control (native) as /devices/virtual/input/input0
Jan  1 01:00:17 et8000 user.info kernel: [    7.985000] input: dreambox advanced remote control (native) as /devices/virtual/input/input1
Jan  1 01:00:17 et8000 user.info kernel: [    8.061000] dvbdev: DVB: registering new adapter (dvb0)
Jan  1 01:00:17 et8000 user.info kernel: [    8.062000] platform dvb0.0: DVB: registering adapter 0 frontend 0 (DVB-C)...
Jan  1 01:00:17 et8000 user.info kernel: [    8.408000] input: front panel as /devices/virtual/input/input2
Jan  1 01:00:17 et8000 user.info kernel: [    9.110000] Registered IR keymap rc-cec
Jan  1 01:00:17 et8000 user.info kernel: [    9.110000] input: RC for hdmi_cec as /devices/platform/hdmi.0/rc/rc0/input3
Jan  1 01:00:17 et8000 user.info kernel: [    9.110000] rc rc0: RC for hdmi_cec as /devices/platform/hdmi.0/rc/rc0
Jan  1 01:00:17 et8000 user.debug kernel: [   10.794000] __clk_enable: network [1]
Jan  1 01:00:17 et8000 user.debug kernel: [   10.794000] bcm7429_pm_network_enable 00
Jan  1 01:00:17 et8000 user.debug kernel: [   10.794000] __clk_enable: enet [1]
Jan  1 01:00:17 et8000 user.debug kernel: [   10.794000] bcm40nm_pm_genet_enable 00
Jan  1 01:00:17 et8000 user.info kernel: [   10.894000] bcmgenet bcmgenet.0 eth0: link up, 1000 Mbps, full duplex
Jan  1 01:00:17 et8000 user.info kernel: [   14.510000] NET: Registered protocol family 10
Jan  1 01:00:17 et8000 user.info kernel: [   14.512000] Segment Routing with IPv6
Jan  1 01:00:17 et8000 user.info kernel: [   14.780000] tun: Universal TUN/TAP device driver, 1.6
Jan  1 01:00:17 et8000 user.info kernel: [   14.780000] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Found user 'avahi' (UID 996) and group 'avahi' (GID 995).
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Successfully dropped root privileges.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: avahi-daemon 0.6.32 starting up.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Successfully called chroot().
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Successfully dropped remaining capabilities.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Loading service file /services/sftp-ssh.service.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Loading service file /services/ssh.service.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv6 with address fe80::216:b4ff:fe06:1a5.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv6 for mDNS.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv4 with address 192.168.1.10.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv4 for mDNS.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Network interface enumeration completed.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Registering new address record for fe80::216:b4ff:fe06:1a5 on eth0.*.
Jan  1 01:00:17 et8000 daemon.info avahi-daemon[514]: Registering new address record for 192.168.1.10 on eth0.IPv4.
Jan  1 01:00:18 et8000 daemon.info avahi-daemon[514]: Server startup complete. Host name is et8000.local. Local service cookie is 4203160540.
Jan  1 01:00:19 et8000 daemon.info avahi-daemon[514]: Service "et8000" (/services/ssh.service) successfully established.
Jan  1 01:00:19 et8000 daemon.info avahi-daemon[514]: Service "et8000" (/services/sftp-ssh.service) successfully established.
Jan  1 01:00:21 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: LZO compression initialized
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Jan  1 01:00:21 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET] (extern ip) [nonblock]
Jan  1 01:00:22 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extren ip):443
Jan  1 01:00:22 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Jan  1 01:00:22 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Jan  1 01:00:22 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=671ab887 6827a099
Jan  1 01:00:22 et8000 daemon.err openvpn[485]: VERIFY ERROR: depth=1, error=certificate is not yet valid: C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Jan  1 01:00:22 et8000 daemon.err openvpn[485]: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Jan  1 01:00:22 et8000 daemon.err openvpn[485]: TLS Error: TLS object -> incoming plaintext read error
Jan  1 01:00:22 et8000 daemon.err openvpn[485]: TLS Error: TLS handshake failed
Jan  1 01:00:22 et8000 daemon.err openvpn[485]: Fatal TLS error (check_tls_errors_co), restarting
Jan  1 01:00:22 et8000 daemon.notice openvpn[485]: TCP/UDP: Closing socket
Jan  1 01:00:22 et8000 daemon.notice openvpn[485]: SIGUSR1[soft,tls-error] received, process restarting
Jan  1 01:00:22 et8000 daemon.notice openvpn[485]: Restart pause, 5 second(s)
Jan  1 01:00:27 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: LZO compression initialized
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Jan  1 01:00:27 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extren ip):443 [nonblock]
Jan  1 01:00:28 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Jan  1 01:00:28 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Jan  1 01:00:28 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Jan  1 01:00:28 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=95ac7213 feec05e9
Jan  1 01:00:29 et8000 daemon.err openvpn[485]: VERIFY ERROR: depth=1, error=certificate is not yet valid: C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Jan  1 01:00:29 et8000 daemon.err openvpn[485]: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Jan  1 01:00:29 et8000 daemon.err openvpn[485]: TLS Error: TLS object -> incoming plaintext read error
Jan  1 01:00:29 et8000 daemon.err openvpn[485]: TLS Error: TLS handshake failed
Jan  1 01:00:29 et8000 daemon.err openvpn[485]: Fatal TLS error (check_tls_errors_co), restarting
Jan  1 01:00:29 et8000 daemon.notice openvpn[485]: TCP/UDP: Closing socket
Jan  1 01:00:29 et8000 daemon.notice openvpn[485]: SIGUSR1[soft,tls-error] received, process restarting
Jan  1 01:00:29 et8000 daemon.notice openvpn[485]: Restart pause, 5 second(s)
Jan  1 01:00:34 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: LZO compression initialized
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extern ip):443 [nonblock]
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=f6ae1d54 44baedae
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: VERIFY ERROR: depth=1, error=certificate is not yet valid: C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: TLS Error: TLS object -> incoming plaintext read error
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: TLS Error: TLS handshake failed
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: Fatal TLS error (check_tls_errors_co), restarting
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCP/UDP: Closing socket
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: SIGUSR1[soft,tls-error] received, process restarting
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: Restart pause, 5 second(s)
Nov 17 17:05:05 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: LZO compression initialized
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extern ip):443 [nonblock]
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=128c130b 07e260bb
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 17:05:07 et8000 daemon.notice openvpn[485]: [netgear] Peer Connection Initiated with [AF_INET](extern ip):443
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 192.168.254.1,route-gateway 192.168.254.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.254.2 255.25
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: timers and/or timeouts modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: --ifconfig/up options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: route options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: route-related options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: ROUTE_GATEWAY 192.168.1.2/255.255.255.0 IFACE=eth0 HWADDR=00:16:b4:06:01:a5
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: TUN/TAP device tun0 opened
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: TUN/TAP TX queue length set to 100
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip link set dev tun0 up mtu 1500
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip addr add dev tun0 192.168.254.2/24 broadcast 192.168.254.255
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route add (extern ip)/32 via 192.168.1.2
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route del 0.0.0.0/0
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route add 0.0.0.0/0 via 192.168.254.1
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: /sbin/ip route add 192.168.1.0/24 via 192.168.254.1
Nov 17 17:05:09 et8000 daemon.warn openvpn[485]: ERROR: Linux route add command failed: external program exited with error status: 2
Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: Initialization Sequence Completed
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Withdrawing address record for 192.168.1.10 on eth0.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Leaving mDNS multicast group on interface eth0.IPv4 with address 192.168.1.10.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Interface eth0.IPv4 no longer relevant for mDNS.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Withdrawing address record for fe80::216:b4ff:fe06:1a5 on eth0.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Leaving mDNS multicast group on interface eth0.IPv6 with address fe80::216:b4ff:fe06:1a5.
Nov 17 17:05:40 et8000 daemon.info avahi-daemon[514]: Interface eth0.IPv6 no longer relevant for mDNS.
Nov 17 17:05:40 et8000 user.debug kernel: [   75.050000] __clk_disable: enet [0]
Nov 17 17:05:40 et8000 user.debug kernel: [   75.050000] bcm40nm_pm_genet_disable 00
Nov 17 17:05:40 et8000 user.debug kernel: [   75.050000] __clk_disable: network [0]
Nov 17 17:05:40 et8000 user.debug kernel: [   75.050000] bcm7429_pm_network_disable 00
Nov 17 17:05:45 et8000 user.debug kernel: [   80.645000] __clk_enable: network [1]
Nov 17 17:05:45 et8000 user.debug kernel: [   80.645000] bcm7429_pm_network_enable 00
Nov 17 17:05:45 et8000 user.debug kernel: [   80.645000] __clk_enable: enet [1]
Nov 17 17:05:45 et8000 user.debug kernel: [   80.645000] bcm40nm_pm_genet_enable 00
Nov 17 17:05:46 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv4 with address 192.168.1.10.
Nov 17 17:05:46 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv4 for mDNS.
Nov 17 17:05:46 et8000 daemon.info avahi-daemon[514]: Registering new address record for 192.168.1.10 on eth0.IPv4.
Nov 17 17:05:47 et8000 daemon.info avahi-daemon[514]: Joining mDNS multicast group on interface eth0.IPv6 with address fe80::216:b4ff:fe06:1a5.
Nov 17 17:05:47 et8000 daemon.info avahi-daemon[514]: New relevant interface eth0.IPv6 for mDNS.
Nov 17 17:05:47 et8000 daemon.info avahi-daemon[514]: Registering new address record for fe80::216:b4ff:fe06:1a5 on eth0.*.
Nov 17 18:05:07 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=251489/0 pkts=1780/0
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 18:05:08 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 19:05:07 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 17 19:05:08 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=443611/0 pkts=2408/0
Nov 17 19:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 19:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 19:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 20:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 20:05:08 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 20:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 21:05:08 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 21:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 22:05:09 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=343063/0 pkts=2058/0
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 22:05:10 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 17 23:05:09 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 17 23:05:10 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 00:05:09 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 01:05:09 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=184822/0 pkts=1350/0
Nov 18 01:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 01:05:09 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 01:05:10 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 02:05:09 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 02:05:11 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 03:05:10 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 03:05:11 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=146779/0 pkts=1199/0
Nov 18 03:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 03:05:11 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 03:05:12 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 04:05:11 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 04:05:12 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 05:05:13 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 06:05:12 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 06:05:13 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=155815/0 pkts=1234/0
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 06:05:14 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 07:05:13 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 07:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 07:05:14 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 07:05:15 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 08:05:14 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 08:05:15 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=-1 bytes=151558/0 pkts=1218/0
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 09:05:16 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=149747/0 pkts=1217/0
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 10:05:16 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 11:05:17 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 12:05:16 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=191176/0 pkts=1438/0
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 12:05:17 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 13:05:17 et8000 daemon.notice openvpn[485]: TLS: soft reset sec=0 bytes=209773/0 pkts=1471/0
Nov 18 13:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 13:05:17 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 13:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 14:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 14:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 15:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 15:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 15:16:47 et8000 authpriv.warn login[17989]: pam_lastlog(login:session): file /var/log/lastlog created
Nov 18 15:16:47 et8000 authpriv.info login[17989]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
Nov 18 15:16:47 et8000 authpriv.notice login[18010]: ROOT LOGIN  on '/dev/pts/0' from '192.168.254.3:59567'
Nov 18 16:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 16:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Nov 18 17:00:42 et8000 authpriv.err vsftpd: pam_listfile(vsftpd:auth): Couldn't open /etc/vsftpd.ftpusers
Nov 18 17:05:17 et8000 daemon.notice openvpn[485]: TLS: tls_process: killed expiring key
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Nov 18 17:05:18 et8000 daemon.notice openvpn[485]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA

Edited by WanWizard, 18 November 2018 - 17:27.

In het bezet van 2x VU+ Ultimo 4k 4TB HDD en 10TB HDD en een Vu plus duo4k SE zonder HDD .

3 Schotels met: 5w,0,8w,3e,4,8e,7e,9e,13e,16e,19,2e,23,5e,28,2e en 42e 

Ziggo Kabel.

Smartkaarten :Ziggo,Fransat ,TVR Roemenië,HD+, SRG/SSR,TNTSAT,TIVUSAT en TV Vlaanderen.


Re: Vpn met xtrend et8000 en openpli 6.2 #27 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 17:34

Je ziet hier dat de router keurig de benodigde settings doorstuurd:

Nov 17 17:05:09 et8000 daemon.notice openvpn[485]: PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 192.168.254.1,route-gateway 192.168.254.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.254.2 255.25

dat vertaalt zich in het willen zetten van de route naar jou netwerk toe:

/sbin/ip route add 192.168.1.0/24 via 192.168.254.1

En dat mislukt om e.o.a. reden:

ERROR: Linux route add command failed: external program exited with error status: 2

waardoor de box de weg niet terug weet.

 

Wat zegt de box als je met de hand dat "ip route add" commando in tikt?


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #28 Egbertjan

  • Senior Member
  • 499 posts

+1
Neutral

Posted 18 November 2018 - 17:40

Dit gebeurt er als ik via telnet "ip route add doe op de box van mijn oma.

 

Attached File  Screenshot_20181118-173704_Mobile Telnet.jpg   38.75KB   1 downloads


Edited by Egbertjan, 18 November 2018 - 17:43.

In het bezet van 2x VU+ Ultimo 4k 4TB HDD en 10TB HDD en een Vu plus duo4k SE zonder HDD .

3 Schotels met: 5w,0,8w,3e,4,8e,7e,9e,13e,16e,19,2e,23,5e,28,2e en 42e 

Ziggo Kabel.

Smartkaarten :Ziggo,Fransat ,TVR Roemenië,HD+, SRG/SSR,TNTSAT,TIVUSAT en TV Vlaanderen.


Re: Vpn met xtrend et8000 en openpli 6.2 #29 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 17:49

Eh, wel de hele regel intikken natuurlijk... ;)

 

Zo dus:

/sbin/ip route add 192.168.1.0/24 via 192.168.254.1

Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #30 Egbertjan

  • Senior Member
  • 499 posts

+1
Neutral

Posted 18 November 2018 - 18:08

 

Eh, wel de hele regel intikken natuurlijk... ;)

 

Zo dus:

/sbin/ip route add 192.168.1.0/24 via 192.168.254.1

Bij deze gedaan

Zie hier het resultaat

Attached File  Screenshot_20181118-180602_Mobile Telnet.jpg   44.57KB   1 downloads 


In het bezet van 2x VU+ Ultimo 4k 4TB HDD en 10TB HDD en een Vu plus duo4k SE zonder HDD .

3 Schotels met: 5w,0,8w,3e,4,8e,7e,9e,13e,16e,19,2e,23,5e,28,2e en 42e 

Ziggo Kabel.

Smartkaarten :Ziggo,Fransat ,TVR Roemenië,HD+, SRG/SSR,TNTSAT,TIVUSAT en TV Vlaanderen.


Re: Vpn met xtrend et8000 en openpli 6.2 #31 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 18:10

Ja, daar was ik al bang voor. Er bestaat al een route voor dat subnet (doordat de LAN dat subnet ook al gebruikt), en dus kun je die niet nog eens zetten.

 

Ik heb dan ook geen flauw idee waarom dit voorheen wel heeft kunnen werken, want de logica schrijft voor dat dit niet het geval kan zijn.

 

Heeft die box van oma een vast IP adres?  Zo ja, dan kun je nog proberen om de default gateway af te zetten.

 

Maar makkelijker is natuurlijk om er voor te zorgen dat er geen IP overlap is tussen beide netwerken...


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #32 Egbertjan

  • Senior Member
  • 499 posts

+1
Neutral

Posted 18 November 2018 - 18:38

Ja, daar was ik al bang voor. Er bestaat al een route voor dat subnet (doordat de LAN dat subnet ook al gebruikt), en dus kun je die niet nog eens zetten.

 

Ik heb dan ook geen flauw idee waarom dit voorheen wel heeft kunnen werken, want de logica schrijft voor dat dit niet het geval kan zijn.

 

Heeft die box van oma een vast IP adres?  Zo ja, dan kun je nog proberen om de default gateway af te zetten.

 

Maar makkelijker is natuurlijk om er voor te zorgen dat er geen IP overlap is tussen beide netwerken...

ik heb de box geen vast ip adres gegeven.

als ik bij mijn broer ben die de zelfde ip range gebruikt 192.168.1.0/24 dan kan ik als ik daar op de vpn ga mijn box van thuis ook gewoon benaderen via 192.168.1.6. Ik ben nog nooit in de problemen geweest met mijn vpn dat we aan beide kanten de zelfde ip range gebruikten. 


In het bezet van 2x VU+ Ultimo 4k 4TB HDD en 10TB HDD en een Vu plus duo4k SE zonder HDD .

3 Schotels met: 5w,0,8w,3e,4,8e,7e,9e,13e,16e,19,2e,23,5e,28,2e en 42e 

Ziggo Kabel.

Smartkaarten :Ziggo,Fransat ,TVR Roemenië,HD+, SRG/SSR,TNTSAT,TIVUSAT en TV Vlaanderen.


Re: Vpn met xtrend et8000 en openpli 6.2 #33 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 18 November 2018 - 18:45

Tja, ik ben ook nog nooit bij het oversteken zonder te kijken aangereden. Maar dat wil niet zeggen dat het een slim idee is. ;)

 

Je doet iets wat netwerktechnisch absoluut vermijden moet worden, als je dat negeert dan kun je er op wachten dat er het e.e.a. een keer omvalt. En dat is nu blijkbaar aan de hand.


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #34 Egbertjan

  • Senior Member
  • 499 posts

+1
Neutral

Posted 18 November 2018 - 19:08

Tja, ik ben ook nog nooit bij het oversteken zonder te kijken aangereden. Maar dat wil niet zeggen dat het een slim idee is. ;)

 

Je doet iets wat netwerktechnisch absoluut vermijden moet worden, als je dat negeert dan kun je er op wachten dat er het e.e.a. een keer omvalt. En dat is nu blijkbaar aan de hand.

Maar is er een manier om het werkende te krijgen zoals ik het in openpli 4.0 had?


In het bezet van 2x VU+ Ultimo 4k 4TB HDD en 10TB HDD en een Vu plus duo4k SE zonder HDD .

3 Schotels met: 5w,0,8w,3e,4,8e,7e,9e,13e,16e,19,2e,23,5e,28,2e en 42e 

Ziggo Kabel.

Smartkaarten :Ziggo,Fransat ,TVR Roemenië,HD+, SRG/SSR,TNTSAT,TIVUSAT en TV Vlaanderen.


Re: Vpn met xtrend et8000 en openpli 6.2 #35 Egbertjan

  • Senior Member
  • 499 posts

+1
Neutral

Posted 22 November 2018 - 19:54

Als ik bij mijn oma op haar router de ip range 10.0.0.0/24 ga instellen is er kans dat het dan wel goed gaat werken?


In het bezet van 2x VU+ Ultimo 4k 4TB HDD en 10TB HDD en een Vu plus duo4k SE zonder HDD .

3 Schotels met: 5w,0,8w,3e,4,8e,7e,9e,13e,16e,19,2e,23,5e,28,2e en 42e 

Ziggo Kabel.

Smartkaarten :Ziggo,Fransat ,TVR Roemenië,HD+, SRG/SSR,TNTSAT,TIVUSAT en TV Vlaanderen.


Re: Vpn met xtrend et8000 en openpli 6.2 #36 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 22 November 2018 - 20:08

Het maakt niet uit wat je er van maakt, als het maar niet hetzelfde is als bij jou thuis. ;)

 

Ik heb bij mijn ouders 192.168.2.0/24 gebruikt, dat werkt net zo goed. Ik gebruik de standaard eigenlijk nergens, dat levert alleen maar van dit soort ellende op...


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #37 Pippin

  • Senior Member
  • 103 posts

+2
Neutral

Posted 22 November 2018 - 22:28

Opmerking: Dit lijdt ook aan het "Tijd niet synchroon op het moment dat OpenVPN start" waardoor de initiële handshake faalt.
Jan  1 01:00:34 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extern ip):443 [nonblock]
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=f6ae1d54 44baedae
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: VERIFY ERROR: depth=1, error=certificate is not yet valid: C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: TLS Error: TLS object -> incoming plaintext read error
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: TLS Error: TLS handshake failed
Jan  1 01:00:35 et8000 daemon.err openvpn[485]: Fatal TLS error (check_tls_errors_co), restarting
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: TCP/UDP: Closing socket
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: SIGUSR1[soft,tls-error] received, process restarting
Jan  1 01:00:35 et8000 daemon.notice openvpn[485]: Restart pause, 5 second(s)
Nov 17 17:05:05 et8000 daemon.warn openvpn[485]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Re-using SSL/TLS context
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: LZO compression initialized
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Control Channel MTU parms [ L:1560 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:143 ET:0 EL:3 AF:3/1 ]
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Local Options hash (VER=V4): 'bc07730e'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Expected Remote Options hash (VER=V4): 'b695cb4a'
Nov 17 17:05:05 et8000 daemon.notice openvpn[485]: Attempting to establish TCP connection with [AF_INET](extern ip):443 [nonblock]
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCP connection established with [AF_INET](extern ip):443
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link local: [undef]
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TCPv4_CLIENT link remote: [AF_INET](extern ip):443
Nov 17 17:05:06 et8000 daemon.notice openvpn[485]: TLS: Initial packet from [AF_INET](extern ip):443, sid=128c130b 07e260bb

Today's scientists have substituted mathematics for experiments, and they wander off through equation after equation, and eventually build a structure which has no relation to reality. Nikola Tesla

Re: Vpn met xtrend et8000 en openpli 6.2 #38 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 22 November 2018 - 22:29

Alles met een certificaat heeft dit probleem. Het had handiger geweest als de fabrikanten een paar cent meer hadden uitgegeven aan een RTC...


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.


Re: Vpn met xtrend et8000 en openpli 6.2 #39 Pippin

  • Senior Member
  • 103 posts

+2
Neutral

Posted 22 November 2018 - 22:37

Yup, maar een
sleep 5
doet ook wonderen... ;)
Today's scientists have substituted mathematics for experiments, and they wander off through equation after equation, and eventually build a structure which has no relation to reality. Nikola Tesla

Re: Vpn met xtrend et8000 en openpli 6.2 #40 WanWizard

  • PLi® Core member
  • 68,588 posts

+1,738
Excellent

Posted 22 November 2018 - 22:41

Als je een box hebt die op iets kan tunen wel ja. Ik gebruik zelf OpenVPN om daardoor de fallback tuner te gebruiken. En dan heb je een kip-en-ei. ;)


Currently in use: VU+ Duo 4K (2xFBC S2), VU+ Solo 4K (1xFBC S2), uClan Usytm 4K Pro (S2+T2), Octagon SF8008 (S2+T2), Zgemma H9.2H (S2+T2)

Due to my bad health, I will not be very active at times and may be slow to respond. I will not read the forum or PM on a regular basis.

Many answers to your question can be found in our new and improved wiki.



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users