Setting up bridged VPN on dreambox linux enigma2 vu+zero

Need help configuring your VPN? Just post here and you'll get that help.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Sat May 23, 2020 7:00 pm

Dear team,

I would like to introce myself as I don't have hudge IT skills. Iam here seeking for some help.


I would like to connect my dreambox (from my local network) vu+zero running openatv6.4 (linux enigma2) to my parents network. (distant)
Router of my parent's network allow only bridged vpn connection.

using the below conf file makes the dreambox connected to the router (I can see my IP on the router logs, and iam well connected) but the PUBLIC IP ADRESS remains mine instead of IP ADRESS of my parents. I want to use their IP adress.
I would like to setup the VPN client in order to get their IP adress on the dreambox.

Client config

client
remote XX.XX.XX.XXX 14750
proto tcp-client
nobind
dev-type tap

pull
dev tap0
route-gateway 192.168.1.254
redirect-gateway def1
auth-user-pass /etc/openvpn/login.txt
auth-retry interact
cipher AES-128-CBC
remote-cert-tls server
verify-x509-name "C=FR, O=Freebox SA, CN=Freebox OpenVPN server 171e6df8ff2a8c87d11573ab31d75db1"
# use tls-remote instead of verify-x509-name for deprecated openssl
# tls-remote "/C=FR/O=Freebox_SA/CN=Freebox_OpenVPN_server_171e6df8ff2a8c87d11573ab31d75db1"
<ca>
-----BEGIN CERTIFICATE-----
MIIDvDCCAqSgAwIBAgIJAIg4EhzqT/PlMA0GCSqGSIb3DQEBCwUAMGsxCzAJBgNV
BAYTAkZSMRMwEQYDVQQKDApGcmVlYm94IFNBMUcwRQYDVQQDDD5GcmVlYm94IE9w
ZW5WUE4gc2VydmVyIENBIGZvciAxNzFlNmRmOGZmMmE4Yzg3ZDExNTczYWIzMWQ3


NB : when I use the same conf file from my PC windows 10, I can connect to their routers with their public IP adress. I do no understand why on the dreambox it is not the same.


sorry for my english as Iam still learning.

Please feel free to ask me if there are info missing.

thank you in advance for your help

NB : I didn't poste all the certificate info as I don't know if it is sensitive data or not.

regards,
soso
Last edited by Pippin on Sun May 24, 2020 12:59 pm, edited 1 time in total.
Reason: Formatting

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Tue Jun 02, 2020 1:02 am

Thank you Pippin for the formatting.

Team, Iam still stuck, if someone could help. If there is something missing I can provide the info. thanks a lot

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Wed Jun 10, 2020 7:42 am

Can someone tell me if informations are missing ? What kind of information donI have to provide to get help from you please ?

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by TinCanTech » Wed Jun 10, 2020 12:40 pm

viewtopic.php?f=30&t=22603#p68963
enigma2user wrote:
Sat May 23, 2020 7:00 pm
I didn't poste all the certificate info as I don't know if it is sensitive data or not
The certificate is a public file, you must key your private key files safe.

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Thu Dec 31, 2020 1:45 am

Hello,
Iam back with this topic.

Please let me know if I was not clear with my intital demand.

Iam still stuck, any help would be much appreciated

tks !

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by TinCanTech » Thu Dec 31, 2020 2:23 am

enigma2user wrote:
Thu Dec 31, 2020 1:45 am
Iam back with this topic.
enigma2user wrote:
Sat May 23, 2020 7:00 pm
I don't have hudge IT skills
You need someone with those skills.

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Sat Jan 02, 2021 5:02 pm

Maybe you can try to help me ?

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Mon Jan 04, 2021 12:49 am

It seems that the tap0 interface is not working properly on the client side.

The client is an openembeded linux (enigma2) box.

The interface tap0 stay DOWN, even if openvpn is running

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Mon Jan 04, 2021 12:52 am

I will post all the configuration file ASAP. Tks

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Mon Jan 04, 2021 7:52 pm

The client is a linux openembeded o-e.
Here is the status interfaces just after Openvpn is activated on the device. The tap0 stay always DOWN.


issue with tap0 interface on client

Code: Select all

root@vuzero:~# ip link
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000
    link/ether 00:1d:ec:0e:42:37 brd ff:ff:ff:ff:ff:ff
4: br0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
6: tap0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 100
    link/ether 16:ba:fd:03:13:20 brd ff:ff:ff:ff:ff:ff
root@vuzero:~#
Client configuration

client
remote XX.XX.XX.XXX XXXX
proto tcp-client
nobind
dev-type tap

pull
dev tap0
auth-user-pass
auth-retry interact
cipher AES-128-CBC
remote-cert-tls server
verify-x509-name "C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed"
# use tls-remote instead of verify-x509-name for deprecated openssl
# tls-remote "/C=FR/O=Freebox_SA/CN=Freebox_OpenVPN_server_a151ab2c98d4d3dd2f9cc9114a0080ed"
<ca>
-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----
</cert>
<extra-certs>
-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----
</extra-certs>
<key>
-----BEGIN PRIVATE KEY-----
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
-----END PRIVATE KEY-----
</key>


Is there a way to make it working properly by activating the the Tap0 interface ?
Last edited by Pippin on Mon Jan 04, 2021 8:14 pm, edited 1 time in total.
Reason: Formatting

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Tue Jan 05, 2021 9:10 pm

herebelow the log

Code: Select all

Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=5781cc6c 6acaae6c
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:21:08 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:21:08 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:21:08 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:21:46 vuzero authpriv.info dropbear[469]: Child connection from 61.85.170.178:37552
Jan  5 21:21:46 vuzero authpriv.info dropbear[470]: Child connection from 61.85.170.178:37558
Jan  5 21:21:47 vuzero authpriv.warn dropbear[469]: Login attempt for nonexistent user from 61.85.170.178:37552[b][u] ====> I don't know what is this ip adress [/u][/b]
Jan  5 21:21:47 vuzero authpriv.warn dropbear[470]: Login attempt for nonexistent user from 61.85.170.178:37558
Jan  5 21:21:48 vuzero authpriv.warn dropbear[469]: pam_unix(dropbear:auth): check pass; user unknown
Jan  5 21:21:48 vuzero authpriv.notice dropbear[469]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.85.170.178 
Jan  5 21:21:48 vuzero authpriv.warn dropbear[470]: pam_unix(dropbear:auth): check pass; user unknown
Jan  5 21:21:48 vuzero authpriv.notice dropbear[470]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.85.170.178 
Jan  5 21:21:50 vuzero authpriv.warn dropbear[469]: pam_authenticate() failed, rc=7, Authentication failure
Jan  5 21:21:50 vuzero authpriv.warn dropbear[469]: Bad PAM password attempt for '<invalid username>' from 61.85.170.178:37552
Jan  5 21:21:50 vuzero authpriv.warn dropbear[470]: pam_authenticate() failed, rc=7, Authentication failure
Jan  5 21:21:50 vuzero authpriv.warn dropbear[470]: Bad PAM password attempt for '<invalid username>' from 61.85.170.178:37558
Jan  5 21:21:51 vuzero authpriv.info dropbear[469]: Exit before auth: Exited normally
Jan  5 21:21:51 vuzero authpriv.info dropbear[470]: Exit before auth: Exited normally
Jan  5 21:22:01 vuzero authpriv.info crond[499]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:22:01 vuzero cron.info CROND[502]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:22:03 vuzero authpriv.info CROND[499]: pam_unix(crond:session): session closed for user root
Jan  5 21:23:01 vuzero authpriv.info crond[629]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:23:01 vuzero cron.info CROND[630]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:23:02 vuzero authpriv.info CROND[629]: pam_unix(crond:session): session closed for user root
Jan  5 21:24:01 vuzero authpriv.info crond[736]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:24:01 vuzero cron.info CROND[737]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:24:01 vuzero authpriv.info CROND[736]: pam_unix(crond:session): session closed for user root
Jan  5 21:25:01 vuzero authpriv.info crond[839]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:25:01 vuzero cron.info CROND[840]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:25:03 vuzero authpriv.info CROND[839]: pam_unix(crond:session): session closed for user root
Jan  5 21:26:01 vuzero authpriv.info crond[942]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:26:01 vuzero cron.info CROND[943]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:26:02 vuzero authpriv.info CROND[942]: pam_unix(crond:session): session closed for user root
Jan  5 21:26:08 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:26:08 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 21:26:08 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=67ef4114 8873703d
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:26:09 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:26:09 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:26:14 vuzero authpriv.info dropbear[969]: Child connection from 221.181.185.200:15188
Jan  5 21:26:16 vuzero authpriv.info dropbear[969]: Exit before auth: Disconnect received
Jan  5 21:27:01 vuzero authpriv.info crond[1045]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:27:01 vuzero cron.info CROND[1046]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:27:02 vuzero authpriv.info CROND[1045]: pam_unix(crond:session): session closed for user root
Jan  5 21:28:01 vuzero authpriv.info crond[1149]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:28:01 vuzero cron.info CROND[1150]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:28:02 vuzero authpriv.info CROND[1149]: pam_unix(crond:session): session closed for user root
Jan  5 21:29:01 vuzero authpriv.info crond[1253]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:29:01 vuzero cron.info CROND[1254]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:29:02 vuzero authpriv.info CROND[1253]: pam_unix(crond:session): session closed for user root
Jan  5 21:30:01 vuzero authpriv.info crond[1355]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:30:01 vuzero cron.info CROND[1357]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:30:01 vuzero authpriv.info crond[1356]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:30:01 vuzero cron.info CROND[1358]: (root) CMD (/usr/bin/ntpdate-sync silent)
Jan  5 21:30:02 vuzero authpriv.info CROND[1355]: pam_unix(crond:session): session closed for user root
Jan  5 21:30:08 vuzero daemon.notice ntpdate[1363]: adjust time server 82.66.249.102 offset 0.012882 sec
Jan  5 21:30:08 vuzero daemon.notice stb-hwclock: Current system time has been written into FP pseudo RTC.
Jan  5 21:30:08 vuzero authpriv.info CROND[1356]: pam_unix(crond:session): session closed for user root
Jan  5 21:31:01 vuzero authpriv.info crond[1469]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:31:01 vuzero cron.info CROND[1470]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:31:02 vuzero authpriv.info CROND[1469]: pam_unix(crond:session): session closed for user root
Jan  5 21:31:09 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:31:09 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 21:31:09 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=21b3c445 6e72b21e
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:31:10 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:31:10 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:32:01 vuzero authpriv.info crond[1570]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:32:01 vuzero cron.info CROND[1572]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:32:02 vuzero authpriv.info CROND[1570]: pam_unix(crond:session): session closed for user root
Jan  5 21:33:01 vuzero authpriv.info crond[1676]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:33:01 vuzero cron.info CROND[1677]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:33:02 vuzero authpriv.info CROND[1676]: pam_unix(crond:session): session closed for user root
Jan  5 21:34:01 vuzero authpriv.info crond[1780]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:34:01 vuzero cron.info CROND[1781]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:34:02 vuzero authpriv.info CROND[1780]: pam_unix(crond:session): session closed for user root
Jan  5 21:35:01 vuzero authpriv.info crond[1878]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:35:01 vuzero cron.info CROND[1879]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:35:02 vuzero authpriv.info CROND[1878]: pam_unix(crond:session): session closed for user root
Jan  5 21:36:01 vuzero authpriv.info crond[1982]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:36:01 vuzero cron.info CROND[1983]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:36:02 vuzero authpriv.info CROND[1982]: pam_unix(crond:session): session closed for user root
Jan  5 21:36:10 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:36:10 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 21:36:10 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=a9c570ec cf492255
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:36:12 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:36:12 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:36:12 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:36:47 vuzero authpriv.info dropbear[2064]: Child connection from 221.131.165.124:57853
Jan  5 21:36:49 vuzero authpriv.info dropbear[2064]: Exit before auth: Disconnect received
Jan  5 21:37:01 vuzero authpriv.info crond[2089]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:37:01 vuzero cron.info CROND[2090]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:37:02 vuzero authpriv.info CROND[2089]: pam_unix(crond:session): session closed for user root
Jan  5 21:38:01 vuzero authpriv.info crond[2191]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:38:01 vuzero cron.info CROND[2192]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:38:01 vuzero authpriv.info CROND[2191]: pam_unix(crond:session): session closed for user root
Jan  5 21:38:20 vuzero authpriv.info dropbear[2225]: Child connection from 221.181.185.135:40375
Jan  5 21:38:23 vuzero authpriv.info dropbear[2225]: Exit before auth: Disconnect received
Jan  5 21:39:01 vuzero authpriv.info crond[2292]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:39:01 vuzero cron.info CROND[2293]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:39:03 vuzero authpriv.info CROND[2292]: pam_unix(crond:session): session closed for user root
Jan  5 21:39:45 vuzero authpriv.info dropbear[2369]: Child connection from IP ADRESS XXXXXXXXX:64127
Jan  5 21:39:48 vuzero authpriv.notice dropbear[2369]: PAM password auth succeeded for 'root' from IP ADRESS XXXXXXXXX:64127
Jan  5 21:40:01 vuzero authpriv.info crond[2397]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:40:01 vuzero cron.info CROND[2398]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:40:01 vuzero authpriv.info CROND[2397]: pam_unix(crond:session): session closed for user root
Jan  5 21:41:01 vuzero authpriv.info crond[2503]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:41:01 vuzero cron.info CROND[2504]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:41:01 vuzero authpriv.info CROND[2503]: pam_unix(crond:session): session closed for user root
Jan  5 21:41:12 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:41:12 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 21:41:12 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=2e46da8d 73753add
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:41:13 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:41:13 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:42:01 vuzero authpriv.info crond[2614]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:42:01 vuzero cron.info CROND[2615]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:42:03 vuzero authpriv.info CROND[2614]: pam_unix(crond:session): session closed for user root
Jan  5 21:43:01 vuzero authpriv.info crond[2717]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:43:01 vuzero cron.info CROND[2718]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:43:02 vuzero authpriv.info CROND[2717]: pam_unix(crond:session): session closed for user root
Jan  5 21:44:01 vuzero authpriv.info crond[2825]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:44:01 vuzero cron.info CROND[2826]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:44:01 vuzero authpriv.info CROND[2825]: pam_unix(crond:session): session closed for user root
Jan  5 21:44:13 vuzero authpriv.info dropbear[2850]: Child connection from 221.181.185.221:12726
Jan  5 21:44:15 vuzero authpriv.info dropbear[2850]: Exit before auth: Disconnect received
Jan  5 21:45:02 vuzero authpriv.info crond[2930]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:45:02 vuzero cron.info CROND[2931]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:45:03 vuzero authpriv.info CROND[2930]: pam_unix(crond:session): session closed for user root
Jan  5 21:46:01 vuzero authpriv.info crond[3037]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:46:01 vuzero cron.info CROND[3038]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:46:02 vuzero authpriv.info CROND[3037]: pam_unix(crond:session): session closed for user root
Jan  5 21:46:13 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:46:13 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 21:46:13 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=0049b6c2 3727ddc9
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:46:14 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:46:14 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:47:01 vuzero authpriv.info crond[3144]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:47:01 vuzero cron.info CROND[3145]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:47:01 vuzero authpriv.info CROND[3144]: pam_unix(crond:session): session closed for user root
Jan  5 21:48:01 vuzero authpriv.info crond[3249]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:48:01 vuzero cron.info CROND[3250]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:48:01 vuzero authpriv.info CROND[3249]: pam_unix(crond:session): session closed for user root
Jan  5 21:49:01 vuzero authpriv.info crond[3357]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:49:01 vuzero cron.info CROND[3358]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:49:03 vuzero authpriv.info CROND[3357]: pam_unix(crond:session): session closed for user root
Jan  5 21:50:01 vuzero authpriv.info crond[3460]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:50:01 vuzero cron.info CROND[3461]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:50:01 vuzero authpriv.info CROND[3460]: pam_unix(crond:session): session closed for user root
Jan  5 21:50:17 vuzero authpriv.info dropbear[3494]: Child connection from 222.187.227.224:16459
Jan  5 21:50:18 vuzero authpriv.info dropbear[3494]: Exit before auth: Disconnect received
Jan  5 21:51:01 vuzero authpriv.info crond[3570]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:51:01 vuzero cron.info CROND[3571]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:51:03 vuzero authpriv.info CROND[3570]: pam_unix(crond:session): session closed for user root
Jan  5 21:51:14 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:51:14 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 21:51:14 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=2216ae33 8b390d19
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:51:16 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:51:16 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:51:16 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:52:01 vuzero authpriv.info crond[3679]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:52:01 vuzero cron.info CROND[3680]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:52:02 vuzero authpriv.info CROND[3679]: pam_unix(crond:session): session closed for user root
Jan  5 21:53:01 vuzero authpriv.info crond[3786]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:53:01 vuzero cron.info CROND[3787]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:53:02 vuzero authpriv.info CROND[3786]: pam_unix(crond:session): session closed for user root
Jan  5 21:54:01 vuzero authpriv.info crond[3893]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:54:01 vuzero cron.info CROND[3894]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:54:01 vuzero authpriv.info CROND[3893]: pam_unix(crond:session): session closed for user root
Jan  5 21:55:01 vuzero authpriv.info crond[4001]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:55:01 vuzero cron.info CROND[4002]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:55:03 vuzero authpriv.info CROND[4001]: pam_unix(crond:session): session closed for user root
Jan  5 21:55:20 vuzero authpriv.info dropbear[4037]: Child connection from IP ADRESS XXXXXXXXX:64180
Jan  5 21:55:22 vuzero authpriv.notice dropbear[4037]: PAM password auth succeeded for 'root' from IP ADRESS XXXXXXXXX:64180
Jan  5 21:56:01 vuzero authpriv.info crond[4108]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:56:01 vuzero cron.info CROND[4109]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:56:02 vuzero authpriv.info CROND[4108]: pam_unix(crond:session): session closed for user root
Jan  5 21:56:16 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:56:16 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 21:56:16 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=1b342dc5 1adf4c8f
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 21:56:17 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 21:56:17 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 21:56:19 vuzero daemon.err openvpn[19495]: Connection reset command was pushed by server ('')
Jan  5 21:56:19 vuzero daemon.notice openvpn[19495]: SIGUSR1[soft,server-pushed-connection-reset] received, process restarting
Jan  5 21:56:24 vuzero daemon.notice openvpn[19495]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:56:24 vuzero daemon.notice openvpn[19495]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 21:56:25 vuzero daemon.notice openvpn[19495]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:56:25 vuzero daemon.notice openvpn[19495]: TCP_CLIENT link local: (not bound)
Jan  5 21:56:25 vuzero daemon.notice openvpn[19495]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1583', remote='link-mtu 1591'
Jan  5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-128-CBC'
Jan  5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
Jan  5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Jan  5 21:56:25 vuzero daemon.notice openvpn[19495]: [Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed] Peer Connection Initiated with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 21:56:32 vuzero daemon.notice openvpn[19495]: TUN/TAP device tap0 opened
Jan  5 21:56:32 vuzero daemon.notice openvpn[19495]: Initialization Sequence Completed
Jan  5 21:56:51 vuzero authpriv.info dropbear[4205]: Child connection from 221.181.185.143:29943
Jan  5 21:56:53 vuzero authpriv.info dropbear[4205]: Exit before auth: Disconnect received
Jan  5 21:57:01 vuzero authpriv.info crond[4223]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:57:01 vuzero cron.info CROND[4224]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:57:01 vuzero authpriv.info CROND[4223]: pam_unix(crond:session): session closed for user root
Jan  5 21:58:01 vuzero authpriv.info crond[4327]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:58:01 vuzero cron.info CROND[4328]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:58:03 vuzero authpriv.info CROND[4327]: pam_unix(crond:session): session closed for user root
Jan  5 21:59:01 vuzero authpriv.info crond[4430]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 21:59:01 vuzero cron.info CROND[4431]: (root) CMD (/etc/RELOAD.sh)
Jan  5 21:59:02 vuzero authpriv.info CROND[4430]: pam_unix(crond:session): session closed for user root
Jan  5 22:00:01 vuzero authpriv.info crond[4535]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:00:01 vuzero cron.info CROND[4537]: (root) CMD (/etc/SUPAUTO.sh)
Jan  5 22:00:01 vuzero authpriv.info crond[4536]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:00:01 vuzero cron.info CROND[4538]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (/etc/SUPAUTO.sh: line 3: ifconfig: command not found)
Jan  5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (invalid data)
Jan  5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (CODE : 787775009098078)
Jan  5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (MAC  :  )
Jan  5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (HASH : 94855ae73151287949585342e84d24ea)
Jan  5 22:00:01 vuzero authpriv.info CROND[4535]: pam_unix(crond:session): session closed for user root
Jan  5 22:00:02 vuzero authpriv.info CROND[4536]: pam_unix(crond:session): session closed for user root
Jan  5 22:01:01 vuzero authpriv.info crond[4648]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:01:01 vuzero cron.info CROND[4649]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:01:02 vuzero authpriv.info CROND[4648]: pam_unix(crond:session): session closed for user root
Jan  5 22:01:12 vuzero authpriv.info dropbear[4672]: Child connection from 81.161.63.100:34092
Jan  5 22:01:13 vuzero authpriv.info dropbear[4672]: Exit before auth: Exited normally
Jan  5 22:01:13 vuzero authpriv.info dropbear[4673]: Child connection from 81.161.63.100:44658
Jan  5 22:01:13 vuzero authpriv.info dropbear[4674]: Child connection from 81.161.63.100:44684
Jan  5 22:01:16 vuzero authpriv.notice dropbear[4673]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.161.63.100  user=root
Jan  5 22:01:16 vuzero authpriv.notice dropbear[4674]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.161.63.100  user=root
Jan  5 22:01:17 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 22:01:17 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 22:01:17 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=73de7e60 7b7abdfb
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 22:01:18 vuzero authpriv.warn dropbear[4673]: pam_authenticate() failed, rc=7, Authentication failure
Jan  5 22:01:18 vuzero authpriv.warn dropbear[4673]: Bad PAM password attempt for 'root' from 81.161.63.100:44658
Jan  5 22:01:18 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 22:01:18 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 22:01:18 vuzero authpriv.warn dropbear[4674]: pam_authenticate() failed, rc=7, Authentication failure
Jan  5 22:01:18 vuzero authpriv.warn dropbear[4674]: Bad PAM password attempt for 'root' from 81.161.63.100:44684
Jan  5 22:01:19 vuzero authpriv.info dropbear[4673]: Exit before auth (user 'root', 1 fails): Exited normally
Jan  5 22:01:19 vuzero authpriv.info dropbear[4674]: Exit before auth (user 'root', 1 fails): Exited normally
Jan  5 22:02:01 vuzero authpriv.info crond[4756]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:02:01 vuzero cron.info CROND[4757]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:02:02 vuzero authpriv.info CROND[4756]: pam_unix(crond:session): session closed for user root
Jan  5 22:02:07 vuzero authpriv.info dropbear[4769]: Child connection from 221.181.185.222:23047
Jan  5 22:02:09 vuzero authpriv.info dropbear[4769]: Exit before auth: Disconnect received
Jan  5 22:03:01 vuzero authpriv.info crond[4860]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:03:01 vuzero cron.info CROND[4861]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:03:01 vuzero authpriv.info CROND[4860]: pam_unix(crond:session): session closed for user root
Jan  5 22:04:01 vuzero authpriv.info crond[4965]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:04:01 vuzero cron.info CROND[4966]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:04:01 vuzero authpriv.info CROND[4965]: pam_unix(crond:session): session closed for user root
Jan  5 22:04:15 vuzero authpriv.info dropbear[4992]: Child connection from 192.241.206.31:56112
Jan  5 22:04:25 vuzero authpriv.info dropbear[4992]: Exit before auth: Exited normally
Jan  5 22:05:01 vuzero authpriv.info crond[5072]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:05:01 vuzero cron.info CROND[5073]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:05:03 vuzero authpriv.info CROND[5072]: pam_unix(crond:session): session closed for user root
Jan  5 22:06:01 vuzero authpriv.info crond[5172]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:06:01 vuzero cron.info CROND[5173]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:06:02 vuzero authpriv.info CROND[5172]: pam_unix(crond:session): session closed for user root
Jan  5 22:06:18 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 22:06:18 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan  5 22:06:18 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=bfa9591d 2fcd12ff
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan  5 22:06:20 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan  5 22:06:20 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan  5 22:06:20 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan  5 22:07:01 vuzero authpriv.info crond[5278]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan  5 22:07:01 vuzero cron.info CROND[5279]: (root) CMD (/etc/RELOAD.sh)
Jan  5 22:07:02 vuzero authpriv.info CROND[5278]: pam_unix(crond:session): session closed for user root
Last edited by Pippin on Tue Jan 05, 2021 9:27 pm, edited 1 time in total.
Reason: Formatting

enigma2user
OpenVpn Newbie
Posts: 11
Joined: Sat May 23, 2020 6:35 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by enigma2user » Sun May 23, 2021 4:49 pm

Hello,

Iam still looking for a solution. If someone could help thanks !

Let me resume my need :

I would like to create a private network on two distants networks.

Network A :
my network where my enigma2 box is located. (Openatv running) (client side)

Network B : the distant network of my parents. (Server side)

why ?

Because Network B (my parents) has access to IPTV channels with their internet provider, only and only if the channels are watched locally within network B. (using a service call « multipost » the Internet provider give the possibility to watch tv content with an m3u playlist but only if you are watching locally.

by creating a VPN connection, I would like to get access to this kind of service. Remotely but acting as a a local device.

as from now, it is working using my computer and openvpn with the conf files (bridged/rooted network) provided by the internet provider.

But I tried to the same on my vu+ zero running openatv with openvpn but I never suceed.

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: Setting up bridged VPN on dreambox linux enigma2 vu+zero

Post by TinCanTech » Sun May 23, 2021 5:57 pm

If you require professional support then I am available for hire: tincantech at protonmail dot com

Post Reply