If I connect via wifi at home or at a public restaurant network, I can surf the web. Reddit, Yahoo, whatever. I can stream youtube.
If I connect via wifi out in public, my xfinity stream app doesn't load. This may be a failsafe protection on their end, being my ISP afterall, for content licensing control. I'm not sure. No big deal if I can't make this work.
But what troubles me is this: If I disconnect from wifi entirely, and am connected via VPN, I can stream youtube in the youtube app. But I cannot browse the internet in Firefox or Firefox Focus whatsoever. Disconnecting from the VPN, yes, I have full internet access in all my apps.
This makes it seem like a client issue, but I see very few settings to adjust. If it's the host issue on the raspberry pi, I am at a loss after googling 5 hours and finding posts by people with similar issues but either no resolution, or a resolution that doesn't work for me (tried changing my cell service APN to run through IPv4 only as opposed to IPv6, but that makes no difference for me).
Even if there is no solution, I'd appreciate any explanation as to why the cell service (tmobile) isn't cooperating with my OpenVPN.
Edit: Client side on Android, OpenVPN does report status "Connected" in all situations. So it does not seem to be an issue in reaching the host raspberry pi.
Edit 2: Here is my log from attempting to first connect via 5G/LTE to Yahoo.com and failing, and then attempting to connect via Wifi to Yahoo.com and succeeding. I see literally no difference in the responses, other than the IP address. So I don't know what more to dig into.
Code: Select all
DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
OpenVPN 2.5.1 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
net_route_v4_best_gw query: dst 0.0.0.0
net_route_v4_best_gw result: via 192.168.0.1 dev wlan0
NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Diffie-Hellman initialized with 2048 bit key
CRL: loaded 1 CRLs from file crl.pem
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
TUN/TAP device tun0 opened
net_iface_mtu_set: mtu 1500 for tun0
net_iface_up: set tun0 up
net_addr_v4_add: 10.8.0.1/24 dev tun0
net_iface_mtu_set: mtu 1500 for tun0
net_iface_up: set tun0 up
net_addr_v6_add: fddd:1194:1194:1194::1/64 dev tun0
Could not determine IPv4/IPv6 protocol. Using AF_INET
Socket Buffers: R=[180224->180224] S=[180224->180224]
UDPv4 link local (bound): [AF_INET]192.168.0.19:1194
UDPv4 link remote: [AF_UNSPEC]
GID set to nogroup
UID set to nobody
MULTI: multi_init called, r=256 v=256
IFCONFIG POOL IPv4: base=10.8.0.2 size=252
IFCONFIG POOL IPv6: base=fddd:1194:1194:1194::1000 size=65536 netbits=64
NOTE: IPv4 pool size is 252, IPv6 pool size is 65536. IPv4 pool size limits the number of clients that can be served from the pool
ifconfig_pool_read(), in='oneplus7,10.8.0.2,fddd:1194:1194:1194::1000'
succeeded -> ifconfig_pool_set(hand=0)
IFCONFIG POOL LIST
oneplus7,10.8.0.2,fddd:1194:1194:1194::1000
Initialization Sequence Completed
172.rst.uvw.xyz:42138 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
172.rst.uvw.xyz:42138 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
172.rst.uvw.xyz:42138 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
172.rst.uvw.xyz:42138 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
172.rst.uvw.xyz:42138 TLS: Initial packet from [AF_INET]172.rst.uvw.xyz:42138, sid=6462177a 1148084a
172.rst.uvw.xyz:42138 VERIFY OK: depth=1, CN=ChangeMe
172.rst.uvw.xyz:42138 VERIFY OK: depth=0, CN=oneplus7
172.rst.uvw.xyz:42138 peer info: IV_VER=3.git::662eae9a:Release
172.rst.uvw.xyz:42138 peer info: IV_PLAT=android
172.rst.uvw.xyz:42138 peer info: IV_NCP=2
172.rst.uvw.xyz:42138 peer info: IV_TCPNL=1
172.rst.uvw.xyz:42138 peer info: IV_PROTO=2
172.rst.uvw.xyz:42138 peer info: IV_IPv6=0
172.rst.uvw.xyz:42138 peer info: IV_AUTO_SESS=1
172.rst.uvw.xyz:42138 peer info: IV_GUI_VER=net.openvpn.connect.android_3.2.5-7182
172.rst.uvw.xyz:42138 peer info: IV_SSO=openurl
172.rst.uvw.xyz:42138 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
172.rst.uvw.xyz:42138 [oneplus7] Peer Connection Initiated with [AF_INET]172.rst.uvw.xyz:42138
oneplus7/172.rst.uvw.xyz:42138 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=fddd:1194:1194:1194::1000
oneplus7/172.rst.uvw.xyz:42138 MULTI: Learn: 10.8.0.2 -> oneplus7/172.rst.uvw.xyz:42138
oneplus7/172.rst.uvw.xyz:42138 MULTI: primary virtual IP for oneplus7/172.rst.uvw.xyz:42138: 10.8.0.2
oneplus7/172.rst.uvw.xyz:42138 MULTI: Learn: fddd:1194:1194:1194::1000 -> oneplus7/172.rst.uvw.xyz:42138
oneplus7/172.rst.uvw.xyz:42138 MULTI: primary virtual IPv6 for oneplus7/172.rst.uvw.xyz:42138: fddd:1194:1194:1194::1000
oneplus7/172.rst.uvw.xyz:42138 Data Channel: using negotiated cipher 'AES-256-GCM'
oneplus7/172.rst.uvw.xyz:42138 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/172.rst.uvw.xyz:42138 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/172.rst.uvw.xyz:42138 PUSH: Received control message: 'PUSH_REQUEST'
oneplus7/172.rst.uvw.xyz:42138 SENT CONTROL [oneplus7]: 'PUSH_REPLY,redirect-gateway def1 ipv6 bypass-dhcp,dhcp-option DNS 10.8.0.1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 fddd:1194:1194:1194::1000/64 fddd:1194:1194:1194::1,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
###The above fails to connect. Just get an "error 500 timeout" on client side browser. The below succeeds to connect and loads the webpage as expcted. (Although with ads... it seems to push through pihole, but that's another issue for another time)
24.abc.def.ghi:37473 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
24.abc.def.ghi:37473 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
24.abc.def.ghi:37473 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
24.abc.def.ghi:37473 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
24.abc.def.ghi:37473 TLS: Initial packet from [AF_INET]24.abc.def.ghi:37473, sid=9634edd6 82214588
oneplus7/172.rst.uvw.xyz:42138 SIGTERM[soft,remote-exit] received, client-instance exiting
24.abc.def.ghi:37473 VERIFY OK: depth=1, CN=ChangeMe
24.abc.def.ghi:37473 VERIFY OK: depth=0, CN=oneplus7
24.abc.def.ghi:37473 peer info: IV_VER=3.git::662eae9a:Release
24.abc.def.ghi:37473 peer info: IV_PLAT=android
24.abc.def.ghi:37473 peer info: IV_NCP=2
24.abc.def.ghi:37473 peer info: IV_TCPNL=1
24.abc.def.ghi:37473 peer info: IV_PROTO=2
24.abc.def.ghi:37473 peer info: IV_IPv6=0
24.abc.def.ghi:37473 peer info: IV_AUTO_SESS=1
24.abc.def.ghi:37473 peer info: IV_GUI_VER=net.openvpn.connect.android_3.2.5-7182
24.abc.def.ghi:37473 peer info: IV_SSO=openurl
24.abc.def.ghi:37473 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
24.abc.def.ghi:37473 [oneplus7] Peer Connection Initiated with [AF_INET]24.abc.def.ghi:37473
oneplus7/24.abc.def.ghi:37473 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=fddd:1194:1194:1194::1000
oneplus7/24.abc.def.ghi:37473 MULTI: Learn: 10.8.0.2 -> oneplus7/24.abc.def.ghi:37473
oneplus7/24.abc.def.ghi:37473 MULTI: primary virtual IP for oneplus7/24.abc.def.ghi:37473: 10.8.0.2
oneplus7/24.abc.def.ghi:37473 MULTI: Learn: fddd:1194:1194:1194::1000 -> oneplus7/24.abc.def.ghi:37473
oneplus7/24.abc.def.ghi:37473 MULTI: primary virtual IPv6 for oneplus7/24.abc.def.ghi:37473: fddd:1194:1194:1194::1000
oneplus7/24.abc.def.ghi:37473 Data Channel: using negotiated cipher 'AES-256-GCM'
oneplus7/24.abc.def.ghi:37473 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/24.abc.def.ghi:37473 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/24.abc.def.ghi:37473 PUSH: Received control message: 'PUSH_REQUEST'
oneplus7/24.abc.def.ghi:37473 SENT CONTROL [oneplus7]: 'PUSH_REPLY,redirect-gateway def1 ipv6 bypass-dhcp,dhcp-option DNS 10.8.0.1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 fddd:1194:1194:1194::1000/64 fddd:1194:1194:1194::1,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
Code: Select all
DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
OpenVPN 2.5.1 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
net_route_v4_best_gw query: dst 0.0.0.0
net_route_v4_best_gw result: via 192.168.0.1 dev wlan0
NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Diffie-Hellman initialized with 2048 bit key
CRL: loaded 1 CRLs from file crl.pem
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
TUN/TAP device tun0 opened
net_iface_mtu_set: mtu 1500 for tun0
net_iface_up: set tun0 up
net_addr_v4_add: 10.8.0.1/24 dev tun0
net_iface_mtu_set: mtu 1500 for tun0
net_iface_up: set tun0 up
net_addr_v6_add: fddd:1194:1194:1194::1/64 dev tun0
Could not determine IPv4/IPv6 protocol. Using AF_INET
Socket Buffers: R=[180224->180224] S=[180224->180224]
UDPv4 link local (bound): [AF_INET]192.168.0.19:1194
UDPv4 link remote: [AF_UNSPEC]
GID set to nogroup
UID set to nobody
MULTI: multi_init called, r=256 v=256
IFCONFIG POOL IPv4: base=10.8.0.2 size=252
IFCONFIG POOL IPv6: base=fddd:1194:1194:1194::1000 size=65536 netbits=64
NOTE: IPv4 pool size is 252, IPv6 pool size is 65536. IPv4 pool size limits the number of clients that can be served from the pool
ifconfig_pool_read(), in='oneplus7,10.8.0.2,fddd:1194:1194:1194::1000'
succeeded -> ifconfig_pool_set(hand=0)
IFCONFIG POOL LIST
oneplus7,10.8.0.2,fddd:1194:1194:1194::1000
Initialization Sequence Completed
172.rst.uvw.xyz:26907 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
172.rst.uvw.xyz:26907 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
172.rst.uvw.xyz:26907 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
172.rst.uvw.xyz:26907 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
172.rst.uvw.xyz:26907 TLS: Initial packet from [AF_INET]172.rst.uvw.xyz:26907, sid=6fd37937 0c0cafa8
172.rst.uvw.xyz:26907 VERIFY OK: depth=1, CN=ChangeMe
172.rst.uvw.xyz:26907 VERIFY OK: depth=0, CN=oneplus7
172.rst.uvw.xyz:26907 peer info: IV_VER=3.git::662eae9a:Release
172.rst.uvw.xyz:26907 peer info: IV_PLAT=android
172.rst.uvw.xyz:26907 peer info: IV_NCP=2
172.rst.uvw.xyz:26907 peer info: IV_TCPNL=1
172.rst.uvw.xyz:26907 peer info: IV_PROTO=2
172.rst.uvw.xyz:26907 peer info: IV_IPv6=0
172.rst.uvw.xyz:26907 peer info: IV_AUTO_SESS=1
172.rst.uvw.xyz:26907 peer info: IV_GUI_VER=net.openvpn.connect.android_3.2.5-7182
172.rst.uvw.xyz:26907 peer info: IV_SSO=openurl
172.rst.uvw.xyz:26907 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
172.rst.uvw.xyz:26907 [oneplus7] Peer Connection Initiated with [AF_INET]172.rst.uvw.xyz:26907
oneplus7/172.rst.uvw.xyz:26907 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=fddd:1194:1194:1194::1000
oneplus7/172.rst.uvw.xyz:26907 MULTI: Learn: 10.8.0.2 -> oneplus7/172.rst.uvw.xyz:26907
oneplus7/172.rst.uvw.xyz:26907 MULTI: primary virtual IP for oneplus7/172.rst.uvw.xyz:26907: 10.8.0.2
oneplus7/172.rst.uvw.xyz:26907 MULTI: Learn: fddd:1194:1194:1194::1000 -> oneplus7/172.rst.uvw.xyz:26907
oneplus7/172.rst.uvw.xyz:26907 MULTI: primary virtual IPv6 for oneplus7/172.rst.uvw.xyz:26907: fddd:1194:1194:1194::1000
oneplus7/172.rst.uvw.xyz:26907 Data Channel: using negotiated cipher 'AES-256-GCM'
oneplus7/172.rst.uvw.xyz:26907 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/172.rst.uvw.xyz:26907 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/172.rst.uvw.xyz:26907 PUSH: Received control message: 'PUSH_REQUEST'
oneplus7/172.rst.uvw.xyz:26907 SENT CONTROL [oneplus7]: 'PUSH_REPLY,redirect-gateway def1 ipv6 bypass-dhcp,dhcp-option DNS 10.8.0.1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 fddd:1194:1194:1194::1000/64 fddd:1194:1194:1194::1,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
24.abc.def.ghi:49253 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
24.abc.def.ghi:49253 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
24.abc.def.ghi:49253 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
24.abc.def.ghi:49253 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
24.abc.def.ghi:49253 TLS: Initial packet from [AF_INET]24.abc.def.ghi:49253, sid=630c6b94 d01e0160
oneplus7/172.rst.uvw.xyz:26907 SIGTERM[soft,remote-exit] received, client-instance exiting
24.abc.def.ghi:49253 VERIFY OK: depth=1, CN=ChangeMe
24.abc.def.ghi:49253 VERIFY OK: depth=0, CN=oneplus7
24.abc.def.ghi:49253 peer info: IV_VER=3.git::662eae9a:Release
24.abc.def.ghi:49253 peer info: IV_PLAT=android
24.abc.def.ghi:49253 peer info: IV_NCP=2
24.abc.def.ghi:49253 peer info: IV_TCPNL=1
24.abc.def.ghi:49253 peer info: IV_PROTO=2
24.abc.def.ghi:49253 peer info: IV_IPv6=0
24.abc.def.ghi:49253 peer info: IV_AUTO_SESS=1
24.abc.def.ghi:49253 peer info: IV_GUI_VER=net.openvpn.connect.android_3.2.5-7182
24.abc.def.ghi:49253 peer info: IV_SSO=openurl
24.abc.def.ghi:49253 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
24.abc.def.ghi:49253 [oneplus7] Peer Connection Initiated with [AF_INET]24.abc.def.ghi:49253
oneplus7/24.abc.def.ghi:49253 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=fddd:1194:1194:1194::1000
oneplus7/24.abc.def.ghi:49253 MULTI: Learn: 10.8.0.2 -> oneplus7/24.abc.def.ghi:49253
oneplus7/24.abc.def.ghi:49253 MULTI: primary virtual IP for oneplus7/24.abc.def.ghi:49253: 10.8.0.2
oneplus7/24.abc.def.ghi:49253 MULTI: Learn: fddd:1194:1194:1194::1000 -> oneplus7/24.abc.def.ghi:49253
oneplus7/24.abc.def.ghi:49253 MULTI: primary virtual IPv6 for oneplus7/24.abc.def.ghi:49253: fddd:1194:1194:1194::1000
oneplus7/24.abc.def.ghi:49253 Data Channel: using negotiated cipher 'AES-256-GCM'
oneplus7/24.abc.def.ghi:49253 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/24.abc.def.ghi:49253 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
oneplus7/24.abc.def.ghi:49253 PUSH: Received control message: 'PUSH_REQUEST'
oneplus7/24.abc.def.ghi:49253 SENT CONTROL [oneplus7]: 'PUSH_REPLY,redirect-gateway def1 ipv6 bypass-dhcp,dhcp-option DNS 10.8.0.1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 fddd:1194:1194:1194::1000/64 fddd:1194:1194:1194::1,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
Code: Select all
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 TLS: Initial packet from [AF_INET]172.rst.uvw.xyz:63690, sid=5718450c 0a9aa958
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 VERIFY OK: depth=1, CN=ChangeMe
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 VERIFY OK: depth=0, CN=oneplus7
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_VER=3.git::662eae9a:Release
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_PLAT=android
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_NCP=2
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_TCPNL=1
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_PROTO=2
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_IPv6=0
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_AUTO_SESS=1
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_GUI_VER=net.openvpn.connect.android_3.2.5-7182
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 peer info: IV_SSO=openurl
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Nov 27 19:53:19 raspberrypi openvpn[23556]: 172.rst.uvw.xyz:63690 [oneplus7] Peer Connection Initiated with [AF_INET]172.rst.uvw.xyz:63690
Nov 27 19:53:19 raspberrypi openvpn[23556]: MULTI: new connection by client 'oneplus7' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
Nov 27 19:53:19 raspberrypi openvpn[23556]: MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=fddd:1194:1194:1194::1000
Nov 27 19:53:19 raspberrypi openvpn[23556]: MULTI: Learn: 10.8.0.2 -> oneplus7/172.rst.uvw.xyz:63690
Nov 27 19:53:19 raspberrypi openvpn[23556]: MULTI: primary virtual IP for oneplus7/172.rst.uvw.xyz:63690: 10.8.0.2
Nov 27 19:53:19 raspberrypi openvpn[23556]: MULTI: Learn: fddd:1194:1194:1194::1000 -> oneplus7/172.rst.uvw.xyz:63690
Nov 27 19:53:19 raspberrypi openvpn[23556]: MULTI: primary virtual IPv6 for oneplus7/172.rst.uvw.xyz:63690: fddd:1194:1194:1194::1000
Nov 27 19:53:19 raspberrypi openvpn[23556]: Data Channel: using negotiated cipher 'AES-256-GCM'
Nov 27 19:53:19 raspberrypi openvpn[23556]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Nov 27 19:53:19 raspberrypi openvpn[23556]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Nov 27 19:53:19 raspberrypi openvpn[23556]: oneplus7/172.rst.uvw.xyz:63690 PUSH: Received control message: 'PUSH_REQUEST'
Nov 27 19:53:19 raspberrypi openvpn[23556]: oneplus7/172.rst.uvw.xyz:63690 SENT CONTROL [oneplus7]: 'PUSH_REPLY,redirect-gateway def1 ipv6 bypass-dhcp,dhcp-option DNS 10.8.0.1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 fddd:1194:1194:1194::1000/64 fddd:1194:1194:1194::1,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Nov 27 19:54:30 raspberrypi openvpn[23556]: event_wait : Interrupted system call (code=4)
Nov 27 19:54:30 raspberrypi openvpn[23556]: SENT CONTROL [oneplus7]: 'RESTART' (status=1)
Nov 27 19:54:30 raspberrypi systemd[1]: Stopping OpenVPN service for server...
Nov 27 19:54:32 raspberrypi openvpn[23556]: Closing TUN/TAP interface
Nov 27 19:54:32 raspberrypi openvpn[23556]: net_addr_v4_del: 10.8.0.1 dev tun0
Nov 27 19:54:32 raspberrypi openvpn[23556]: sitnl_send: rtnl: generic error (-1): Operation not permitted
Nov 27 19:54:32 raspberrypi openvpn[23556]: Linux can't del IP from iface tun0
Nov 27 19:54:32 raspberrypi openvpn[23556]: net_addr_v6_del: fddd:1194:1194:1194::1/64 dev tun0
Nov 27 19:54:32 raspberrypi openvpn[23556]: sitnl_send: rtnl: generic error (-1): Operation not permitted
Nov 27 19:54:32 raspberrypi openvpn[23556]: Linux can't del IPv6 from iface tun0
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: carrier lost
Nov 27 19:54:32 raspberrypi openvpn[23556]: SIGTERM[hard,] received, process exiting
Nov 27 19:54:32 raspberrypi systemd[1]: openvpn-server@server.service: Succeeded.
Nov 27 19:54:32 raspberrypi systemd[1]: Stopped OpenVPN service for server.
Nov 27 19:54:32 raspberrypi systemd[1]: openvpn-server@server.service: Consumed 53.581s CPU time.
Nov 27 19:54:32 raspberrypi systemd[1]: Starting OpenVPN service for server...
Nov 27 19:54:32 raspberrypi systemd[1]: Started OpenVPN service for server.
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: removing interface
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: IAID 74:75:6e:30
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: using static address 10.8.0.1/24
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: adding route to 10.8.0.0/24
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: adding default route via 192.168.0.1
Nov 27 19:54:32 raspberrypi dhcpcd[537]: if_route (ADD): Network is unreachable
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: soliciting an IPv6 router
Nov 27 19:54:32 raspberrypi dhcpcd[537]: tun0: pid 537 deleted route to 10.8.0.0/24
Nov 27 19:56:25 raspberrypi dbus-daemon[850]: [session uid=1000 pid=850] Activating service name='org.xfce.Xfconf' requested by ':1.33' (uid=1000 pid=7935 comm="mousepad ")
Nov 27 19:56:25 raspberrypi dbus-daemon[850]: [session uid=1000 pid=850] Successfully activated service 'org.xfce.Xfconf'
Nov 27 19:56:28 raspberrypi dbus-daemon[850]: [session uid=1000 pid=850] Activating service name='ca.desrt.dconf' requested by ':1.33' (uid=1000 pid=7935 comm="mousepad ")
Nov 27 19:56:28 raspberrypi dbus-daemon[850]: [session uid=1000 pid=850] Successfully activated service 'ca.desrt.dconf'
Nov 27 19:56:32 raspberrypi dbus-daemon[399]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.246' (uid=1000 pid=7935 comm="mousepad ")
Nov 27 19:56:32 raspberrypi systemd[1]: Starting Hostname Service...
Nov 27 19:56:32 raspberrypi dbus-daemon[399]: [system] Successfully activated service 'org.freedesktop.hostname1'
Nov 27 19:56:32 raspberrypi systemd[1]: Started Hostname Service.
Nov 27 19:57:03 raspberrypi systemd[1]: systemd-hostnamed.service: Succeeded.
Nov 27 19:57:48 raspberrypi dbus-daemon[399]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.249' (uid=1000 pid=7935 comm="mousepad ")
Nov 27 19:57:48 raspberrypi systemd[1]: Starting Hostname Service...
Nov 27 19:57:48 raspberrypi dbus-daemon[399]: [system] Successfully activated service 'org.freedesktop.hostname1'
Nov 27 19:57:48 raspberrypi systemd[1]: Started Hostname Service.
Nov 27 19:58:18 raspberrypi systemd[1]: systemd-hostnamed.service: Succeeded.