Facing Frequent disconnections
Using Asus Merlin Firmware. But noted in the past few days that the my openvpn connection is getting disconnected. This is not getting reconnected. Have to manually change the IP address and then select the SERVICE STATE- to ON position. During this item my router is getting connected to the ISP and exposing my usage details.
During disconnection- the Log states error-
During disconnection- the Log states error-
"Jun 29 10:07:18 openvpn[15221]: TLS: tls_process: killed expiring key
Jun 29 10:07:19 openvpn[15221]: TLS: soft reset sec=0 bytes=39198580/67108864 pkts=44459/0
Jun 29 10:07:19 openvpn[15221]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, [email protected]
Jun 29 10:07:19 openvpn[15221]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=32042641a13462681baebd6464cf6113, name=32042641a13462681baebd6464cf6113
Jun 29 10:07:19 openvpn[15221]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jun 29 10:07:19 openvpn[15221]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Jun 29 10:07:19 openvpn[15221]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jun 29 10:07:19 openvpn[15221]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Jun 29 10:07:19 openvpn[15221]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Jun 29 10:07:19 openvpn[15221]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Jun 29 10:07:19 openvpn[15221]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jun 29 10:58:52 openvpn[15221]: [32042641a13462681baebd6464cf6113] Inactivity timeout (--ping-restart), restarting
Jun 29 10:58:52 openvpn[15221]: SIGUSR1[soft,ping-restart] received, process restarting
Jun 29 10:58:52 openvpn[15221]: Restart pause, 5 second(s)
Jun 29 10:58:57 openvpn[15221]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jun 29 10:58:57 openvpn[15221]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 29 10:58:57 openvpn[15221]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.188.196:53
Jun 29 10:58:57 openvpn[15221]: Socket Buffers: R=[122880->122880] S=[122880->122880]
Jun 29 10:58:57 openvpn[15221]: UDP link local: (not bound)
Jun 29 10:58:57 openvpn[15221]: UDP link remote: [AF_INET]46.166.188.196:53
Jun 29 10:58:58 openvpn[15221]: TLS: Initial packet from [AF_INET]46.166.188.196:53, sid=3a217c46 4dacfa3f
Jun 29 10:58:58 openvpn[15221]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, [email protected]
Jun 29 10:58:58 openvpn[15221]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=32042641a13462681baebd6464cf6113, name=32042641a13462681baebd6464cf6113
Jun 29 10:58:58 openvpn[15221]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jun 29 10:58:58 openvpn[15221]: [32042641a13462681baebd6464cf6113] Peer Connection Initiated with [AF_INET]46.166.188.196:53
Jun 29 10:58:59 openvpn[15221]: SENT CONTROL [32042641a13462681baebd6464cf6113]: 'PUSH_REQUEST' (status=1)
Jun 29 10:59:04 openvpn[15221]: SENT CONTROL [32042641a13462681baebd6464cf6113]: 'PUSH_REQUEST' (status=1)
Jun 29 10:59:04 openvpn[15221]: AUTH: Received control message: AUTH_FAILED
Jun 29 10:59:04 openvpn[15221]: vpnrouting.sh tun11 1500 1622 10.1.10.10 10.1.10.9 init
Jun 29 10:59:04 openvpn-routing: Configuring policy rules for client 1
Jun 29 10:59:04 openvpn-routing: Flushing client routing table
Jun 29 10:59:04 openvpn-routing: Completed routing policy configuration for client 1
Jun 29 10:59:04 openvpn[15221]: /usr/sbin/ip route del 10.1.10.1/32
Jun 29 10:59:04 openvpn[15221]: /usr/sbin/ip route del 46.166.188.196/32
Jun 29 10:59:04 openvpn[15221]: /usr/sbin/ip route del 0.0.0.0/1
Jun 29 10:59:04 openvpn[15221]: /usr/sbin/ip route del 128.0.0.0/1
Jun 29 10:59:04 openvpn[15221]: Closing TUN/TAP interface
Jun 29 10:59:04 openvpn[15221]: /usr/sbin/ip addr del dev tun11 local 10.1.10.10 peer 10.1.10.9
Jun 29 10:59:04 openvpn[15221]: updown.sh tun11 1500 1622 10.1.10.10 10.1.10.9 init
Jun 29 10:59:05 rc_service: service 26358:notify_rc updateresolv
Jun 29 10:59:06 openvpn[15221]: SIGTERM[soft,auth-failure] received, process exiting"
Can anybody help me.
Can anybody help me.
Comments