Apr 16 13:59:39 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 13:59:40 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 13:59:40 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 13:59:40 ovpn-client1[14042]: VERIFY KU OK Apr 16 13:59:40 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 13:59:40 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 13:59:40 ovpn-client1[14042]: VERIFY EKU OK Apr 16 13:59:40 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 13:59:40 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 13:59:40 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 13:59:40 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 14:02:40 ovpn-client2[4773]: TLS: tls_process: killed expiring key Apr 16 14:02:44 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 14:02:44 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 14:02:44 ovpn-client2[4773]: VERIFY KU OK Apr 16 14:02:44 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 14:02:44 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 14:02:44 ovpn-client2[4773]: VERIFY EKU OK Apr 16 14:02:44 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 14:02:44 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 14:02:44 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 14:02:44 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 14:59:40 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 14:59:40 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 14:59:40 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 14:59:40 ovpn-client1[14042]: VERIFY KU OK Apr 16 14:59:40 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 14:59:40 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 14:59:40 ovpn-client1[14042]: VERIFY EKU OK Apr 16 14:59:40 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 14:59:41 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 14:59:41 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 14:59:41 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 15:02:44 ovpn-client2[4773]: TLS: tls_process: killed expiring key Apr 16 15:02:45 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 15:02:45 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 15:02:45 ovpn-client2[4773]: VERIFY KU OK Apr 16 15:02:45 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 15:02:45 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 15:02:45 ovpn-client2[4773]: VERIFY EKU OK Apr 16 15:02:45 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 15:02:45 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 15:02:45 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 15:02:45 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 15:59:40 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 15:59:42 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 15:59:42 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 15:59:42 ovpn-client1[14042]: VERIFY KU OK Apr 16 15:59:42 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 15:59:42 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 15:59:42 ovpn-client1[14042]: VERIFY EKU OK Apr 16 15:59:42 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 15:59:42 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 15:59:42 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 15:59:42 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 16:02:45 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 16:02:45 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 16:02:45 ovpn-client2[4773]: VERIFY KU OK Apr 16 16:02:45 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 16:02:45 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 16:02:45 ovpn-client2[4773]: VERIFY EKU OK Apr 16 16:02:45 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 16:02:45 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 16:02:45 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 16:02:45 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 16:59:43 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 16:59:49 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 16:59:49 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 16:59:49 ovpn-client1[14042]: VERIFY KU OK Apr 16 16:59:49 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 16:59:49 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 16:59:49 ovpn-client1[14042]: VERIFY EKU OK Apr 16 16:59:49 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 16:59:49 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 16:59:49 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 16:59:49 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 17:02:45 ovpn-client2[4773]: TLS: tls_process: killed expiring key Apr 16 17:02:46 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 17:02:46 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 17:02:46 ovpn-client2[4773]: VERIFY KU OK Apr 16 17:02:46 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 17:02:46 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 17:02:46 ovpn-client2[4773]: VERIFY EKU OK Apr 16 17:02:46 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 17:02:46 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 17:02:46 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 17:02:46 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 17:59:44 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 17:59:49 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 17:59:49 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 17:59:49 ovpn-client1[14042]: VERIFY KU OK Apr 16 17:59:49 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 17:59:49 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 17:59:49 ovpn-client1[14042]: VERIFY EKU OK Apr 16 17:59:49 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 17:59:49 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 17:59:49 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 17:59:49 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 18:02:46 ovpn-client2[4773]: TLS: tls_process: killed expiring key Apr 16 18:02:47 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 18:02:47 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 18:02:47 ovpn-client2[4773]: VERIFY KU OK Apr 16 18:02:47 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 18:02:47 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 18:02:47 ovpn-client2[4773]: VERIFY EKU OK Apr 16 18:02:47 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 18:02:47 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 18:02:47 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 18:02:47 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 18:59:49 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 18:59:51 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 18:59:51 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 18:59:51 ovpn-client1[14042]: VERIFY KU OK Apr 16 18:59:51 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 18:59:51 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 18:59:51 ovpn-client1[14042]: VERIFY EKU OK Apr 16 18:59:51 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 18:59:51 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 18:59:51 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 18:59:51 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 19:02:48 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 19:02:48 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 19:02:48 ovpn-client2[4773]: VERIFY KU OK Apr 16 19:02:48 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 19:02:48 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 19:02:48 ovpn-client2[4773]: VERIFY EKU OK Apr 16 19:02:48 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 19:02:51 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 19:02:51 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 19:02:51 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 19:59:52 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 19:59:53 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 19:59:53 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 19:59:53 ovpn-client1[14042]: VERIFY KU OK Apr 16 19:59:53 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 19:59:53 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 19:59:53 ovpn-client1[14042]: VERIFY EKU OK Apr 16 19:59:53 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 19:59:53 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 19:59:53 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 19:59:53 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 20:02:47 ovpn-client2[4773]: TLS: tls_process: killed expiring key Apr 16 20:02:52 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 20:02:52 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 20:02:52 ovpn-client2[4773]: VERIFY KU OK Apr 16 20:02:52 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 20:02:52 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 20:02:52 ovpn-client2[4773]: VERIFY EKU OK Apr 16 20:02:52 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 20:02:52 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 20:02:52 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 20:02:52 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 20:59:53 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 20:59:54 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 20:59:54 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 20:59:54 ovpn-client1[14042]: VERIFY KU OK Apr 16 20:59:54 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 20:59:54 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 20:59:54 ovpn-client1[14042]: VERIFY EKU OK Apr 16 20:59:54 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 20:59:54 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 20:59:54 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 20:59:54 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 21:02:51 ovpn-client2[4773]: TLS: tls_process: killed expiring key Apr 16 21:02:53 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 21:02:53 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 21:02:53 ovpn-client2[4773]: VERIFY KU OK Apr 16 21:02:53 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 21:02:53 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 21:02:53 ovpn-client2[4773]: VERIFY EKU OK Apr 16 21:02:53 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 21:02:53 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 21:02:53 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 21:02:53 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 21:59:54 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 21:59:57 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 21:59:57 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 21:59:57 ovpn-client1[14042]: VERIFY KU OK Apr 16 21:59:57 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 21:59:57 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 21:59:57 ovpn-client1[14042]: VERIFY EKU OK Apr 16 21:59:57 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 21:59:57 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 21:59:57 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 21:59:57 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 22:02:53 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 22:02:53 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 22:02:53 ovpn-client2[4773]: VERIFY KU OK Apr 16 22:02:53 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 22:02:53 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 22:02:53 ovpn-client2[4773]: VERIFY EKU OK Apr 16 22:02:53 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 22:02:53 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 22:02:53 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 22:02:53 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 22:54:35 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Apr 16 22:54:35 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Office Apr 16 22:59:56 ovpn-client1[14042]: TLS: tls_process: killed expiring key Apr 16 22:59:57 ovpn-client1[14042]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 22:59:57 ovpn-client1[14042]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 22:59:57 ovpn-client1[14042]: VERIFY KU OK Apr 16 22:59:57 ovpn-client1[14042]: Validating certificate extended key usage Apr 16 22:59:57 ovpn-client1[14042]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 22:59:57 ovpn-client1[14042]: VERIFY EKU OK Apr 16 22:59:57 ovpn-client1[14042]: VERIFY OK: depth=0, CN=ch327.nordvpn.com Apr 16 22:59:58 ovpn-client1[14042]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 22:59:58 ovpn-client1[14042]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 22:59:58 ovpn-client1[14042]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 23:02:53 ovpn-client2[4773]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 23:02:53 ovpn-client2[4773]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 23:02:53 ovpn-client2[4773]: VERIFY KU OK Apr 16 23:02:53 ovpn-client2[4773]: Validating certificate extended key usage Apr 16 23:02:53 ovpn-client2[4773]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 23:02:53 ovpn-client2[4773]: VERIFY EKU OK Apr 16 23:02:53 ovpn-client2[4773]: VERIFY OK: depth=0, CN=sg477.nordvpn.com Apr 16 23:02:53 ovpn-client2[4773]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 23:02:53 ovpn-client2[4773]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 23:02:53 ovpn-client2[4773]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 23:09:57 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Apr 16 23:09:57 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Wohnzimmer Apr 16 23:47:01 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.172 58:d3:49:30:0f:e2 Apr 16 23:47:01 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.172 58:d3:49:30:0f:e2 Bedroom Apr 16 23:59:00 vpnmgr: Retrieving recommended VPN server using NordVPN API with below parameters Apr 16 23:59:00 vpnmgr: Retrieving recommended VPN server using NordVPN API with below parameters Apr 16 23:59:00 vpnmgr: Protocol: UDP - Type: Standard - Country: Singapore Apr 16 23:59:00 vpnmgr: Protocol: UDP - Type: Standard - Country: Switzerland - City: Zurich Apr 16 23:59:11 vpnmgr: Updating VPN client 2 to NordVPN server Apr 16 23:59:11 rc_service: service 22578:notify_rc restart_vpnclient2 Apr 16 23:59:11 custom_script: Running /jffs/scripts/service-event (args: restart vpnclient2) Apr 16 23:59:11 vpnmgr: VPN client 2 updated successfully (SG466 Standard UDP) Apr 16 23:59:11 ovpn-client2[4773]: event_wait : Interrupted system call (code=4) Apr 16 23:59:11 ovpn-client2[4773]: SIGTERM received, sending exit notification to peer Apr 16 23:59:12 vpnmgr: Updating VPN client 1 to NordVPN server Apr 16 23:59:12 rc_service: service 22698:notify_rc restart_vpnclient1 Apr 16 23:59:12 rc_service: waitting "restart_vpnclient2" via ... Apr 16 23:59:13 ovpn-client2[4773]: ovpn-route-pre-down tun12 1500 1585 10.8.2.5 255.255.255.0 init Apr 16 23:59:13 ovpn-client2[4773]: Closing TUN/TAP interface Apr 16 23:59:13 ovpn-client2[4773]: /usr/sbin/ip addr del dev tun12 10.8.2.5/24 Apr 16 23:59:13 lldpd[2080]: removal request for address of 10.8.2.5%91, but no knowledge of it Apr 16 23:59:13 ovpn-client2[4773]: ovpn-down 2 client tun12 1500 1585 10.8.2.5 255.255.255.0 init Apr 16 23:59:13 openvpn-routing: Configured killswitch on VPN client 2 Apr 16 23:59:13 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 16 23:59:13 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 16 23:59:13 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 16 23:59:13 ovpn-client2[4773]: SIGTERM[soft,exit-with-notification] received, process exiting Apr 16 23:59:13 openvpn-routing: Clearing routing table for VPN client 2 Apr 16 23:59:13 ovpn-client2[22817]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Apr 16 23:59:13 ovpn-client2[22817]: OpenVPN 2.5.5 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 2 2022 Apr 16 23:59:13 ovpn-client2[22817]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.08 Apr 16 23:59:13 ovpn-client2[22818]: WARNING: --ping should normally be used with --ping-restart or --ping-exit Apr 16 23:59:13 ovpn-client2[22818]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 16 23:59:13 ovpn-client2[22818]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 16 23:59:13 ovpn-client2[22818]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 16 23:59:13 ovpn-client2[22818]: TCP/UDP: Preserving recently used remote address: [AF_INET]84.17.39.130:1194 Apr 16 23:59:13 ovpn-client2[22818]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 16 23:59:13 ovpn-client2[22818]: UDP link local: (not bound) Apr 16 23:59:13 ovpn-client2[22818]: UDP link remote: [AF_INET]84.17.39.130:1194 Apr 16 23:59:13 ovpn-client2[22818]: TLS: Initial packet from [AF_INET]84.17.39.130:1194, sid=6ba9353d 4fcfbbfa Apr 16 23:59:13 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 23:59:13 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 23:59:13 ovpn-client2[22818]: VERIFY KU OK Apr 16 23:59:13 ovpn-client2[22818]: Validating certificate extended key usage Apr 16 23:59:13 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 23:59:13 ovpn-client2[22818]: VERIFY EKU OK Apr 16 23:59:13 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 16 23:59:13 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 23:59:13 ovpn-client2[22818]: [sg466.nordvpn.com] Peer Connection Initiated with [AF_INET]84.17.39.130:1194 Apr 16 23:59:13 custom_script: Running /jffs/scripts/service-event (args: restart vpnclient1) Apr 16 23:59:13 vpnmgr: VPN client 1 updated successfully (CH224 Standard UDP) Apr 16 23:59:13 ovpn-client1[14042]: event_wait : Interrupted system call (code=4) Apr 16 23:59:13 ovpn-client1[14042]: SIGTERM received, sending exit notification to peer Apr 16 23:59:14 ovpn-client2[22818]: SENT CONTROL [sg466.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 16 23:59:14 ovpn-client2[22818]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.3.6 255.255.255.0,peer-id 4,cipher AES-256-GCM' Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: timers and/or timeouts modified Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: compression parms modified Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 16 23:59:14 ovpn-client2[22818]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: --ifconfig/up options modified Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: route options modified Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: route-related options modified Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: peer-id set Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: adjusting link_mtu to 1656 Apr 16 23:59:14 ovpn-client2[22818]: OPTIONS IMPORT: data channel crypto options modified Apr 16 23:59:14 ovpn-client2[22818]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 16 23:59:14 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 23:59:14 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 23:59:14 ovpn-client2[22818]: TUN/TAP device tun12 opened Apr 16 23:59:14 ovpn-client2[22818]: TUN/TAP TX queue length set to 1000 Apr 16 23:59:14 ovpn-client2[22818]: /usr/sbin/ip link set dev tun12 up mtu 1500 Apr 16 23:59:14 ovpn-client2[22818]: /usr/sbin/ip link set dev tun12 up Apr 16 23:59:14 ovpn-client2[22818]: /usr/sbin/ip addr add dev tun12 10.8.3.6/24 Apr 16 23:59:14 ovpn-client2[22818]: ovpn-up 2 client tun12 1500 1584 10.8.3.6 255.255.255.0 init Apr 16 23:59:14 openvpn-routing: Setting client 2 routing table's default route through the tunnel Apr 16 23:59:14 openvpn-routing: Routing iPhone 12 from 192.168.1.126 to any through ovpnc2 Apr 16 23:59:14 openvpn-routing: Routing iPad from 192.168.1.30 to any through ovpnc2 Apr 16 23:59:14 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 16 23:59:14 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 16 23:59:14 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 16 23:59:15 ovpn-client1[14042]: ovpn-route-pre-down tun11 1500 1584 10.8.0.8 255.255.255.0 init Apr 16 23:59:15 ovpn-client1[14042]: Closing TUN/TAP interface Apr 16 23:59:15 ovpn-client1[14042]: /usr/sbin/ip addr del dev tun11 10.8.0.8/24 Apr 16 23:59:15 lldpd[2080]: removal request for address of 10.8.0.8%95, but no knowledge of it Apr 16 23:59:15 ovpn-client1[14042]: ovpn-down 1 client tun11 1500 1584 10.8.0.8 255.255.255.0 init Apr 16 23:59:15 openvpn-routing: Configured killswitch on VPN client 1 Apr 16 23:59:15 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 16 23:59:15 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 16 23:59:15 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 16 23:59:15 ovpn-client1[14042]: SIGTERM[soft,exit-with-notification] received, process exiting Apr 16 23:59:15 openvpn-routing: Clearing routing table for VPN client 1 Apr 16 23:59:15 ovpn-client1[22992]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Apr 16 23:59:15 ovpn-client1[22992]: OpenVPN 2.5.5 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 2 2022 Apr 16 23:59:15 ovpn-client1[22992]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.08 Apr 16 23:59:15 ovpn-client1[22993]: WARNING: --ping should normally be used with --ping-restart or --ping-exit Apr 16 23:59:15 ovpn-client1[22993]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 16 23:59:15 ovpn-client1[22993]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 16 23:59:15 ovpn-client1[22993]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 16 23:59:15 ovpn-client1[22993]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.18.163:1194 Apr 16 23:59:15 ovpn-client1[22993]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 16 23:59:15 ovpn-client1[22993]: UDP link local: (not bound) Apr 16 23:59:15 ovpn-client1[22993]: UDP link remote: [AF_INET]185.9.18.163:1194 Apr 16 23:59:15 ovpn-client1[22993]: TLS: Initial packet from [AF_INET]185.9.18.163:1194, sid=1748b699 63d8df78 Apr 16 23:59:16 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 16 23:59:16 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 16 23:59:16 ovpn-client1[22993]: VERIFY KU OK Apr 16 23:59:16 ovpn-client1[22993]: Validating certificate extended key usage Apr 16 23:59:16 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 16 23:59:16 ovpn-client1[22993]: VERIFY EKU OK Apr 16 23:59:16 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 16 23:59:16 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 16 23:59:16 ovpn-client1[22993]: [ch224.nordvpn.com] Peer Connection Initiated with [AF_INET]185.9.18.163:1194 Apr 16 23:59:17 ovpn-client2[22818]: Initialization Sequence Completed Apr 16 23:59:17 ovpn-client1[22993]: SENT CONTROL [ch224.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 16 23:59:17 ovpn-client1[22993]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.1.9 255.255.255.0,peer-id 7,cipher AES-256-GCM' Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: timers and/or timeouts modified Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: compression parms modified Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 16 23:59:17 ovpn-client1[22993]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: --ifconfig/up options modified Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: route options modified Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: route-related options modified Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: peer-id set Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: adjusting link_mtu to 1656 Apr 16 23:59:17 ovpn-client1[22993]: OPTIONS IMPORT: data channel crypto options modified Apr 16 23:59:17 ovpn-client1[22993]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 16 23:59:17 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 23:59:17 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 16 23:59:17 ovpn-client1[22993]: TUN/TAP device tun11 opened Apr 16 23:59:17 ovpn-client1[22993]: TUN/TAP TX queue length set to 1000 Apr 16 23:59:17 ovpn-client1[22993]: /usr/sbin/ip link set dev tun11 up mtu 1500 Apr 16 23:59:17 ovpn-client1[22993]: /usr/sbin/ip link set dev tun11 up Apr 16 23:59:17 ovpn-client1[22993]: /usr/sbin/ip addr add dev tun11 10.8.1.9/24 Apr 16 23:59:17 ovpn-client1[22993]: ovpn-up 1 client tun11 1500 1584 10.8.1.9 255.255.255.0 init Apr 16 23:59:17 openvpn-routing: Setting client 1 routing table's default route through the tunnel Apr 16 23:59:17 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 16 23:59:17 openvpn: Forcing 192.168.1.34 to use DNS server 103.86.96.100 Apr 16 23:59:17 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 16 23:59:17 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 16 23:59:17 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 16 23:59:19 ovpn-client1[22993]: Initialization Sequence Completed Apr 17 00:00:00 vpnmgr: Refreshing NordVPN country data... Apr 17 00:00:11 vpnmgr: No changes in NordVPN country data Apr 17 00:00:11 vpnmgr: Refreshing OpenVPN file archives... Apr 17 00:00:38 vpnmgr: No changes in PIA OpenVPN file archives Apr 17 00:00:51 vpnmgr: No changes in WeVPN OpenVPN file archives Apr 17 00:02:14 ovpn-client2[22818]: [sg466.nordvpn.com] Inactivity timeout (--ping-restart), restarting Apr 17 00:02:14 ovpn-client2[22818]: SIGUSR1[soft,ping-restart] received, process restarting Apr 17 00:02:14 ovpn-client2[22818]: Restart pause, 5 second(s) Apr 17 00:02:19 ovpn-client2[22818]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 17 00:02:19 ovpn-client2[22818]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 00:02:19 ovpn-client2[22818]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 00:02:19 ovpn-client2[22818]: TCP/UDP: Preserving recently used remote address: [AF_INET]84.17.39.130:1194 Apr 17 00:02:19 ovpn-client2[22818]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 17 00:02:19 ovpn-client2[22818]: UDP link local: (not bound) Apr 17 00:02:19 ovpn-client2[22818]: UDP link remote: [AF_INET]84.17.39.130:1194 Apr 17 00:02:19 ovpn-client2[22818]: TLS: Initial packet from [AF_INET]84.17.39.130:1194, sid=a10e56e5 04af3608 Apr 17 00:02:19 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 00:02:19 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 00:02:19 ovpn-client2[22818]: VERIFY KU OK Apr 17 00:02:19 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 00:02:19 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 00:02:19 ovpn-client2[22818]: VERIFY EKU OK Apr 17 00:02:19 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 00:02:19 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 00:02:19 ovpn-client2[22818]: [sg466.nordvpn.com] Peer Connection Initiated with [AF_INET]84.17.39.130:1194 Apr 17 00:02:20 ovpn-client2[22818]: SENT CONTROL [sg466.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 17 00:02:20 ovpn-client2[22818]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.1.4 255.255.255.0,peer-id 2,cipher AES-256-GCM' Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: timers and/or timeouts modified Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: compression parms modified Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 17 00:02:20 ovpn-client2[22818]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: --ifconfig/up options modified Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: route options modified Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: route-related options modified Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: peer-id set Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: adjusting link_mtu to 1657 Apr 17 00:02:20 ovpn-client2[22818]: OPTIONS IMPORT: data channel crypto options modified Apr 17 00:02:20 ovpn-client2[22818]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 17 00:02:20 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 00:02:20 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 00:02:20 ovpn-client2[22818]: Preserving previous TUN/TAP instance: tun12 Apr 17 00:02:20 ovpn-client2[22818]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device. Apr 17 00:02:20 ovpn-client2[22818]: ovpn-route-pre-down tun12 1500 1585 10.8.3.6 255.255.255.0 init Apr 17 00:02:20 ovpn-client2[22818]: Closing TUN/TAP interface Apr 17 00:02:20 ovpn-client2[22818]: /usr/sbin/ip addr del dev tun12 10.8.3.6/24 Apr 17 00:02:20 lldpd[2080]: removal request for address of 10.8.3.6%97, but no knowledge of it Apr 17 00:02:20 ovpn-client2[22818]: ovpn-down 2 client tun12 1500 1585 10.8.3.6 255.255.255.0 init Apr 17 00:02:20 openvpn-routing: Configured killswitch on VPN client 2 Apr 17 00:02:20 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 00:02:20 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 17 00:02:20 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 17 00:02:21 ovpn-client2[22818]: TUN/TAP device tun12 opened Apr 17 00:02:21 ovpn-client2[22818]: TUN/TAP TX queue length set to 1000 Apr 17 00:02:21 ovpn-client2[22818]: /usr/sbin/ip link set dev tun12 up mtu 1500 Apr 17 00:02:21 ovpn-client2[22818]: /usr/sbin/ip link set dev tun12 up Apr 17 00:02:21 ovpn-client2[22818]: /usr/sbin/ip addr add dev tun12 10.8.1.4/24 Apr 17 00:02:21 ovpn-client2[22818]: ovpn-up 2 client tun12 1500 1585 10.8.1.4 255.255.255.0 init Apr 17 00:02:21 openvpn-routing: Setting client 2 routing table's default route through the tunnel Apr 17 00:02:21 openvpn-routing: Routing iPhone 12 from 192.168.1.126 to any through ovpnc2 Apr 17 00:02:21 openvpn-routing: Routing iPad from 192.168.1.30 to any through ovpnc2 Apr 17 00:02:21 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 00:02:21 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 17 00:02:21 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 17 00:02:23 ovpn-client2[22818]: Initialization Sequence Completed Apr 17 00:59:17 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 00:59:17 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 00:59:17 ovpn-client1[22993]: VERIFY KU OK Apr 17 00:59:17 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 00:59:17 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 00:59:17 ovpn-client1[22993]: VERIFY EKU OK Apr 17 00:59:17 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 00:59:17 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 00:59:17 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 00:59:17 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 01:02:20 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 01:02:20 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 01:02:20 ovpn-client2[22818]: VERIFY KU OK Apr 17 01:02:20 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 01:02:20 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 01:02:20 ovpn-client2[22818]: VERIFY EKU OK Apr 17 01:02:20 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 01:02:20 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 01:02:20 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 01:02:20 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 01:59:17 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 01:59:19 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 01:59:19 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 01:59:19 ovpn-client1[22993]: VERIFY KU OK Apr 17 01:59:19 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 01:59:19 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 01:59:19 ovpn-client1[22993]: VERIFY EKU OK Apr 17 01:59:19 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 01:59:20 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 01:59:20 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 01:59:20 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 02:02:20 ovpn-client2[22818]: TLS: tls_process: killed expiring key Apr 17 02:02:21 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 02:02:21 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 02:02:21 ovpn-client2[22818]: VERIFY KU OK Apr 17 02:02:21 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 02:02:21 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 02:02:21 ovpn-client2[22818]: VERIFY EKU OK Apr 17 02:02:21 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 02:02:21 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 02:02:21 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 02:02:21 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 02:59:20 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 02:59:20 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 02:59:20 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 02:59:20 ovpn-client1[22993]: VERIFY KU OK Apr 17 02:59:20 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 02:59:20 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 02:59:20 ovpn-client1[22993]: VERIFY EKU OK Apr 17 02:59:20 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 02:59:20 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 02:59:20 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 02:59:20 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 03:02:21 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 03:02:21 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 03:02:21 ovpn-client2[22818]: VERIFY KU OK Apr 17 03:02:21 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 03:02:21 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 03:02:21 ovpn-client2[22818]: VERIFY EKU OK Apr 17 03:02:21 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 03:02:21 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 03:02:21 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 03:02:21 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 03:59:20 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 03:59:21 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 03:59:21 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 03:59:21 ovpn-client1[22993]: VERIFY KU OK Apr 17 03:59:21 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 03:59:21 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 03:59:21 ovpn-client1[22993]: VERIFY EKU OK Apr 17 03:59:21 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 03:59:22 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 03:59:22 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 03:59:22 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 04:02:21 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 04:02:21 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 04:02:21 ovpn-client2[22818]: VERIFY KU OK Apr 17 04:02:21 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 04:02:21 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 04:02:21 ovpn-client2[22818]: VERIFY EKU OK Apr 17 04:02:21 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 04:02:21 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 04:02:21 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 04:02:21 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 04:59:22 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 04:59:23 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 04:59:23 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 04:59:23 ovpn-client1[22993]: VERIFY KU OK Apr 17 04:59:23 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 04:59:23 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 04:59:23 ovpn-client1[22993]: VERIFY EKU OK Apr 17 04:59:23 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 04:59:23 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 04:59:23 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 04:59:23 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 05:02:21 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 05:02:21 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 05:02:21 ovpn-client2[22818]: VERIFY KU OK Apr 17 05:02:21 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 05:02:21 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 05:02:21 ovpn-client2[22818]: VERIFY EKU OK Apr 17 05:02:21 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 05:02:21 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 05:02:21 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 05:02:21 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 05:59:22 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 05:59:23 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 05:59:23 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 05:59:23 ovpn-client1[22993]: VERIFY KU OK Apr 17 05:59:23 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 05:59:23 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 05:59:23 ovpn-client1[22993]: VERIFY EKU OK Apr 17 05:59:23 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 05:59:24 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 05:59:24 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 05:59:24 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 06:02:21 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 06:02:21 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 06:02:21 ovpn-client2[22818]: VERIFY KU OK Apr 17 06:02:21 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 06:02:21 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 06:02:21 ovpn-client2[22818]: VERIFY EKU OK Apr 17 06:02:21 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 06:02:21 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 06:02:21 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 06:02:21 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 06:59:23 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 06:59:25 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 06:59:25 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 06:59:25 ovpn-client1[22993]: VERIFY KU OK Apr 17 06:59:25 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 06:59:25 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 06:59:25 ovpn-client1[22993]: VERIFY EKU OK Apr 17 06:59:25 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 06:59:25 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 06:59:25 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 06:59:25 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 07:02:21 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 07:02:21 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 07:02:21 ovpn-client2[22818]: VERIFY KU OK Apr 17 07:02:21 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 07:02:21 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 07:02:21 ovpn-client2[22818]: VERIFY EKU OK Apr 17 07:02:21 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 07:02:21 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 07:02:21 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 07:02:21 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 07:59:25 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 07:59:26 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 07:59:26 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 07:59:26 ovpn-client1[22993]: VERIFY KU OK Apr 17 07:59:26 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 07:59:26 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 07:59:26 ovpn-client1[22993]: VERIFY EKU OK Apr 17 07:59:26 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 07:59:27 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 07:59:27 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 07:59:27 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 08:02:22 ovpn-client2[22818]: TLS: tls_process: killed expiring key Apr 17 08:02:22 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 08:02:22 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 08:02:22 ovpn-client2[22818]: VERIFY KU OK Apr 17 08:02:22 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 08:02:22 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 08:02:22 ovpn-client2[22818]: VERIFY EKU OK Apr 17 08:02:22 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 08:02:22 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 08:02:22 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 08:02:22 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 08:59:26 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 08:59:27 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 08:59:27 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 08:59:27 ovpn-client1[22993]: VERIFY KU OK Apr 17 08:59:27 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 08:59:27 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 08:59:27 ovpn-client1[22993]: VERIFY EKU OK Apr 17 08:59:27 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 08:59:28 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 08:59:28 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 08:59:28 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 09:02:22 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 09:02:22 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 09:02:22 ovpn-client2[22818]: VERIFY KU OK Apr 17 09:02:22 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 09:02:22 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 09:02:22 ovpn-client2[22818]: VERIFY EKU OK Apr 17 09:02:22 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 09:02:22 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 09:02:22 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 09:02:22 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 09:59:27 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 09:59:28 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 09:59:28 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 09:59:28 ovpn-client1[22993]: VERIFY KU OK Apr 17 09:59:28 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 09:59:28 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 09:59:28 ovpn-client1[22993]: VERIFY EKU OK Apr 17 09:59:28 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 09:59:28 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 09:59:28 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 09:59:28 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 09:59:54 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Apr 17 09:59:54 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Office Apr 17 10:02:22 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 10:02:22 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 10:02:22 ovpn-client2[22818]: VERIFY KU OK Apr 17 10:02:22 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 10:02:22 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 10:02:22 ovpn-client2[22818]: VERIFY EKU OK Apr 17 10:02:22 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 10:02:22 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 10:02:22 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 10:02:22 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 10:16:19 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Apr 17 10:16:19 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Wohnzimmer Apr 17 10:46:46 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.172 58:d3:49:30:0f:e2 Apr 17 10:46:46 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.172 58:d3:49:30:0f:e2 Bedroom Apr 17 10:59:29 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 10:59:30 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 10:59:30 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 10:59:30 ovpn-client1[22993]: VERIFY KU OK Apr 17 10:59:30 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 10:59:30 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 10:59:30 ovpn-client1[22993]: VERIFY EKU OK Apr 17 10:59:30 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 10:59:30 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 10:59:30 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 10:59:30 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 11:02:22 ovpn-client2[22818]: TLS: tls_process: killed expiring key Apr 17 11:02:23 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 11:02:23 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 11:02:23 ovpn-client2[22818]: VERIFY KU OK Apr 17 11:02:23 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 11:02:23 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 11:02:23 ovpn-client2[22818]: VERIFY EKU OK Apr 17 11:02:23 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 11:02:23 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 11:02:23 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 11:02:23 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 11:25:53 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 11:25:53 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 11:25:54 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 36:cd:dc:2b:52:b9 Apr 17 11:25:54 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 11:25:55 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 11:25:55 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 11:25:57 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:25:57 wlceventd: wlceventd_proc_event(556): eth5: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:26:00 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 2e:65:bf:c6:a3:df Apr 17 11:26:00 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:26:00 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 2e:65:bf:c6:a3:df Apr 17 11:26:00 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:26:01 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:26:01 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:26:59 wlceventd: wlceventd_proc_event(527): eth6: Auth 06:7A:56:5E:6B:8D, status: Successful (0), rssi:0 Apr 17 11:26:59 wlceventd: wlceventd_proc_event(556): eth6: Assoc 06:7A:56:5E:6B:8D, status: Successful (0), rssi:0 Apr 17 11:26:59 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 06:7a:56:5e:6b:8d Apr 17 11:26:59 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 11:27:00 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 11:27:00 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 11:27:33 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 06:7a:56:5e:6b:8d Apr 17 11:27:33 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 11:27:34 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 11:27:34 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 11:29:57 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:29:57 wlceventd: wlceventd_proc_event(537): eth6: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:29:57 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:29:57 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:29:57 kernel: br0: received packet on eth6 with own address as source address Apr 17 11:29:57 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:29:57 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:31:51 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:31:51 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:33:13 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:33:13 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:33:13 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:33:13 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 11:41:04 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:41:04 wlceventd: wlceventd_proc_event(537): eth5: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 11:41:04 kernel: br0: received packet on eth5 with own address as source address Apr 17 11:41:04 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:41:04 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:41:23 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 17 11:41:23 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:42:33 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 06:7A:56:5E:6B:8D, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 17 11:42:33 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 06:7A:56:5E:6B:8D, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:43:22 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 17 11:43:22 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 11:59:29 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 11:59:31 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 11:59:31 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 11:59:31 ovpn-client1[22993]: VERIFY KU OK Apr 17 11:59:31 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 11:59:31 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 11:59:31 ovpn-client1[22993]: VERIFY EKU OK Apr 17 11:59:31 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 11:59:31 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 11:59:31 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 11:59:31 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 12:02:22 ovpn-client2[22818]: TLS: tls_process: killed expiring key Apr 17 12:02:23 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 12:02:23 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 12:02:23 ovpn-client2[22818]: VERIFY KU OK Apr 17 12:02:23 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 12:02:23 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 12:02:23 ovpn-client2[22818]: VERIFY EKU OK Apr 17 12:02:23 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 12:02:23 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 12:02:23 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 12:02:23 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 12:59:30 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 12:59:32 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 12:59:32 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 12:59:32 ovpn-client1[22993]: VERIFY KU OK Apr 17 12:59:32 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 12:59:32 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 12:59:32 ovpn-client1[22993]: VERIFY EKU OK Apr 17 12:59:32 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 12:59:32 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 12:59:32 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 12:59:32 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 13:02:23 ovpn-client2[22818]: TLS: tls_process: killed expiring key Apr 17 13:02:23 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 13:02:23 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 13:02:23 ovpn-client2[22818]: VERIFY KU OK Apr 17 13:02:23 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 13:02:23 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 13:02:23 ovpn-client2[22818]: VERIFY EKU OK Apr 17 13:02:23 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 13:02:23 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 13:02:23 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 13:02:23 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 13:36:15 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 13:36:15 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 13:36:15 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 36:cd:dc:2b:52:b9 Apr 17 13:36:15 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 13:36:16 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 13:36:16 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 13:36:20 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 13:36:20 wlceventd: wlceventd_proc_event(556): eth5: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 13:36:20 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:36:20 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:36:42 wlceventd: wlceventd_proc_event(527): eth6: Auth 06:7A:56:5E:6B:8D, status: Successful (0), rssi:0 Apr 17 13:36:42 wlceventd: wlceventd_proc_event(556): eth6: Assoc 06:7A:56:5E:6B:8D, status: Successful (0), rssi:-60 Apr 17 13:36:42 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 13:36:42 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 13:39:26 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=www.youporn.com Apr 17 13:39:27 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=www.youporn.com Apr 17 13:39:27 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=www.youporn.com Apr 17 13:39:27 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=www.youporn.com Apr 17 13:40:21 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 13:40:21 wlceventd: wlceventd_proc_event(537): eth6: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 13:40:21 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 13:40:21 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 13:40:21 kernel: br0: received packet on eth6 with own address as source address Apr 17 13:40:21 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:40:21 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:41:21 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:41:21 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:46:15 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 13:46:15 wlceventd: wlceventd_proc_event(537): eth5: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 13:46:15 kernel: br0: received packet on eth5 with own address as source address Apr 17 13:46:15 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 13:46:15 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 13:46:15 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:46:15 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 13:47:17 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 17 13:47:17 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 13:47:28 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:0 Apr 17 13:59:32 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 13:59:32 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 13:59:32 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 13:59:32 ovpn-client1[22993]: VERIFY KU OK Apr 17 13:59:32 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 13:59:32 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 13:59:32 ovpn-client1[22993]: VERIFY EKU OK Apr 17 13:59:32 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 13:59:33 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 13:59:33 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 13:59:33 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 14:02:24 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 14:02:24 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 14:02:24 ovpn-client2[22818]: VERIFY KU OK Apr 17 14:02:24 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 14:02:24 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 14:02:24 ovpn-client2[22818]: VERIFY EKU OK Apr 17 14:02:24 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 14:02:24 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 14:02:24 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 14:02:24 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 14:27:39 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 14:27:39 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 14:27:40 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:27:40 wlceventd: wlceventd_proc_event(556): eth5: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:27:40 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:27:40 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:27:41 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:27:41 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:27:41 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:27:41 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:27:43 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:27:43 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:28:56 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:28:56 wlceventd: wlceventd_proc_event(537): eth6: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:28:56 kernel: br0: received packet on eth6 with own address as source address Apr 17 14:28:56 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:28:56 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:28:56 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:0 Apr 17 14:28:56 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:28:56 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:29:47 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:29:47 wlceventd: wlceventd_proc_event(537): eth5: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:29:47 kernel: br0: received packet on eth5 with own address as source address Apr 17 14:29:47 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:29:47 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:29:47 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:29:47 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:31:26 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 17 14:31:26 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:32:07 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 17 14:32:07 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:32:50 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:32:50 wlceventd: wlceventd_proc_event(556): eth5: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:32:50 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:32:50 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:33:04 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 14:33:04 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 14:33:05 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:33:05 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 14:33:36 wlceventd: wlceventd_proc_event(527): eth6: Auth 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 17 14:33:36 wlceventd: wlceventd_proc_event(556): eth6: Assoc 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 17 14:33:36 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 17 14:33:36 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:33:37 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:33:37 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 17 14:34:05 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 17 14:34:05 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:34:06 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:34:06 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 17 14:34:07 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 17 14:34:07 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:34:08 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 3C:A6:F6:6C:B1:C8, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:34:10 wlceventd: wlceventd_proc_event(527): eth6: Auth 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 17 14:34:10 wlceventd: wlceventd_proc_event(556): eth6: Assoc 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 17 14:34:12 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 17 14:34:12 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:34:13 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 17 14:34:13 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:34:16 dnsmasq-dhcp[1563]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 17 14:34:16 dnsmasq-dhcp[1563]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:34:17 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:34:17 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 17 14:34:38 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-62 Apr 17 14:34:38 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:34:38 wlceventd: wlceventd_proc_event(537): eth6: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 14:34:38 kernel: br0: received packet on eth6 with own address as source address Apr 17 14:34:38 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:34:38 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:34:38 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 14:45:27 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 3C:A6:F6:6C:B1:C8, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 14:45:28 wlceventd: wlceventd_proc_event(527): eth6: Auth 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 17 14:45:28 wlceventd: wlceventd_proc_event(556): eth6: Assoc 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 17 14:45:29 dnsmasq-dhcp[1563]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 17 14:45:29 dnsmasq-dhcp[1563]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 17 14:47:02 kernel: httpd (1246): drop_caches: 1 Apr 17 14:59:32 ovpn-client1[22993]: TLS: tls_process: killed expiring key Apr 17 14:59:33 ovpn-client1[22993]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 14:59:33 ovpn-client1[22993]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 14:59:33 ovpn-client1[22993]: VERIFY KU OK Apr 17 14:59:33 ovpn-client1[22993]: Validating certificate extended key usage Apr 17 14:59:33 ovpn-client1[22993]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 14:59:33 ovpn-client1[22993]: VERIFY EKU OK Apr 17 14:59:33 ovpn-client1[22993]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 14:59:34 ovpn-client1[22993]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 14:59:34 ovpn-client1[22993]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 14:59:34 ovpn-client1[22993]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 15:02:23 ovpn-client2[22818]: TLS: tls_process: killed expiring key Apr 17 15:02:24 ovpn-client2[22818]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 15:02:24 ovpn-client2[22818]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 15:02:24 ovpn-client2[22818]: VERIFY KU OK Apr 17 15:02:24 ovpn-client2[22818]: Validating certificate extended key usage Apr 17 15:02:24 ovpn-client2[22818]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 15:02:24 ovpn-client2[22818]: VERIFY EKU OK Apr 17 15:02:24 ovpn-client2[22818]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 15:02:25 ovpn-client2[22818]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:02:25 ovpn-client2[22818]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:02:25 ovpn-client2[22818]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 15:12:11 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-75 Apr 17 15:12:11 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 15:12:11 wlceventd: wlceventd_proc_event(537): eth6: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 15:12:22 rc_service: httpd 1246:notify_rc restart_wan_if 0;restart_stubby Apr 17 15:12:22 custom_script: Running /jffs/scripts/service-event (args: restart wan_if) Apr 17 15:12:22 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 17 15:12:22 openvpn-routing: Configured killswitch on VPN client 1 Apr 17 15:12:22 ovpn-client1[22993]: event_wait : Interrupted system call (code=4) Apr 17 15:12:22 ovpn-client1[22993]: SIGTERM received, sending exit notification to peer Apr 17 15:12:24 ovpn-client1[22993]: ovpn-route-pre-down tun11 1500 1584 10.8.1.9 255.255.255.0 init Apr 17 15:12:24 ovpn-client1[22993]: Closing TUN/TAP interface Apr 17 15:12:24 ovpn-client1[22993]: /usr/sbin/ip addr del dev tun11 10.8.1.9/24 Apr 17 15:12:24 lldpd[2080]: removal request for address of 10.8.1.9%99, but no knowledge of it Apr 17 15:12:24 ovpn-client1[22993]: ovpn-down 1 client tun11 1500 1584 10.8.1.9 255.255.255.0 init Apr 17 15:12:24 openvpn-routing: Configured killswitch on VPN client 1 Apr 17 15:12:24 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 15:12:24 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 17 15:12:24 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 17 15:12:24 ovpn-client1[22993]: SIGTERM[soft,exit-with-notification] received, process exiting Apr 17 15:12:24 openvpn-routing: Clearing routing table for VPN client 1 Apr 17 15:12:24 openvpn-routing: Routing iPhone 12 from 192.168.1.126 to any through ovpnc2 Apr 17 15:12:24 openvpn-routing: Routing iPad from 192.168.1.30 to any through ovpnc2 Apr 17 15:12:24 openvpn-routing: Configured killswitch on VPN client 2 Apr 17 15:12:24 ovpn-client2[22818]: event_wait : Interrupted system call (code=4) Apr 17 15:12:24 ovpn-client2[22818]: SIGTERM received, sending exit notification to peer Apr 17 15:12:25 ovpn-client2[22818]: ovpn-route-pre-down tun12 1500 1585 10.8.1.4 255.255.255.0 init Apr 17 15:12:25 ovpn-client2[22818]: Closing TUN/TAP interface Apr 17 15:12:25 ovpn-client2[22818]: /usr/sbin/ip addr del dev tun12 10.8.1.4/24 Apr 17 15:12:25 lldpd[2080]: removal request for address of 10.8.1.4%97, but no knowledge of it Apr 17 15:12:25 ovpn-client2[22818]: ovpn-down 2 client tun12 1500 1585 10.8.1.4 255.255.255.0 init Apr 17 15:12:25 openvpn-routing: Configured killswitch on VPN client 2 Apr 17 15:12:25 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 15:12:25 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 17 15:12:25 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 17 15:12:25 ovpn-client2[22818]: SIGTERM[soft,exit-with-notification] received, process exiting Apr 17 15:12:25 openvpn-routing: Clearing routing table for VPN client 2 Apr 17 15:12:25 pppd[602]: Hangup (SIGHUP) Apr 17 15:12:25 pppd[602]: Terminating on signal 15 Apr 17 15:12:25 pppd[602]: Connect time 5426.7 minutes. Apr 17 15:12:25 pppd[602]: Sent 778186525 bytes, received 3321670479 bytes. Apr 17 15:12:25 lldpd[2080]: removal request for address of 100.64.21.1%83, but no knowledge of it Apr 17 15:12:25 wsdd2[1585]: error: wsdd-mcast-v4: wsd_send_soap_msg: send Apr 17 15:12:25 pppd[602]: Connection terminated. Apr 17 15:12:25 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 15:12:25 dnsmasq[1563]: using nameserver 149.112.112.112#53 Apr 17 15:12:25 dnsmasq[1563]: using nameserver 9.9.9.9#53 Apr 17 15:12:25 pppd[602]: Sent PADT Apr 17 15:12:25 pppd[602]: Exit. Apr 17 15:12:26 lldpd[2080]: removal request for address of 169.254.252.121%9, but no knowledge of it Apr 17 15:12:26 wsdd2[1585]: error: wsdd-mcast-v4: wsd_send_soap_msg: send Apr 17 15:12:28 pppd[3469]: Plugin rp-pppoe.so loaded. Apr 17 15:12:28 pppd[3469]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.7 Apr 17 15:12:28 custom_script: Running /jffs/scripts/service-event (args: restart stubby) Apr 17 15:12:28 pppd[3471]: pppd 2.4.7 started by admin, uid 0 Apr 17 15:12:29 pppd[3471]: PPP session is 3107 (0xc23) Apr 17 15:12:29 pppd[3471]: Connected to 00:00:5e:00:01:01 via interface eth0 Apr 17 15:12:29 pppd[3471]: Using interface ppp0 Apr 17 15:12:29 pppd[3471]: Connect: ppp0 <--> eth0 Apr 17 15:12:29 pppd[3471]: Remote message: Authentication success,Welcome! Apr 17 15:12:29 pppd[3471]: PAP authentication succeeded Apr 17 15:12:29 pppd[3471]: peer from calling number 00:00:5E:00:01:01 authorized Apr 17 15:12:29 lldpd[2080]: removal request for address of 100.64.21.215%102, but no knowledge of it Apr 17 15:12:29 wsdd2[1585]: error: wsdd-mcast-v4: wsd_send_soap_msg: send Apr 17 15:12:29 pppd[3471]: local IP address 100.64.21.215 Apr 17 15:12:29 pppd[3471]: remote IP address 100.64.21.1 Apr 17 15:12:29 pppd[3471]: primary DNS address 203.150.213.1 Apr 17 15:12:29 pppd[3471]: secondary DNS address 203.150.218.161 Apr 17 15:12:29 lldpd[2080]: removal request for address of 100.64.21.1%102, but no knowledge of it Apr 17 15:12:29 wsdd2[1585]: error: wsdd-mcast-v4: wsd_send_soap_msg: send Apr 17 15:12:29 lldpd[2080]: removal request for address of 100.64.21.215%102, but no knowledge of it Apr 17 15:12:29 wsdd2[1585]: error: wsdd-mcast-v4: wsd_send_soap_msg: send Apr 17 15:12:29 lldpd[2080]: removal request for address of 100.64.21.215%102, but no knowledge of it Apr 17 15:12:29 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 15:12:29 dnsmasq[1563]: using nameserver 203.150.218.161#53 Apr 17 15:12:29 dnsmasq[1563]: using nameserver 203.150.213.1#53 Apr 17 15:12:29 wan: finish adding multi routes Apr 17 15:12:29 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 17 15:12:29 openvpn-routing: Configured killswitch on VPN client 1 Apr 17 15:12:29 openvpn-routing: Routing iPhone 12 from 192.168.1.126 to any through ovpnc2 Apr 17 15:12:29 openvpn-routing: Routing iPad from 192.168.1.30 to any through ovpnc2 Apr 17 15:12:29 openvpn-routing: Configured killswitch on VPN client 2 Apr 17 15:12:29 miniupnpd[715]: shutting down MiniUPnPd Apr 17 15:12:34 miniupnpd[3588]: HTTP listening on port 50407 Apr 17 15:12:34 miniupnpd[3588]: Listening for NAT-PMP/PCP traffic on port 5351 Apr 17 15:12:34 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 17 15:12:34 openvpn-routing: Configured killswitch on VPN client 1 Apr 17 15:12:34 rc_service: ip-up 3480:notify_rc start_vpnclient1 Apr 17 15:12:34 custom_script: Running /jffs/scripts/service-event (args: start vpnclient1) Apr 17 15:12:34 openvpn-routing: Routing iPhone 12 from 192.168.1.126 to any through ovpnc2 Apr 17 15:12:34 openvpn-routing: Routing iPad from 192.168.1.30 to any through ovpnc2 Apr 17 15:12:34 openvpn-routing: Configured killswitch on VPN client 2 Apr 17 15:12:34 rc_service: ip-up 3480:notify_rc start_vpnclient2 Apr 17 15:12:34 rc_service: waitting "start_vpnclient1" via ip-up ... Apr 17 15:12:34 ovpn-client1[3651]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Apr 17 15:12:34 ovpn-client1[3651]: OpenVPN 2.5.5 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 2 2022 Apr 17 15:12:34 ovpn-client1[3651]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.08 Apr 17 15:12:34 ovpn-client1[3652]: WARNING: --ping should normally be used with --ping-restart or --ping-exit Apr 17 15:12:34 ovpn-client1[3652]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 17 15:12:34 ovpn-client1[3652]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 15:12:34 ovpn-client1[3652]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 15:12:34 ovpn-client1[3652]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.18.163:1194 Apr 17 15:12:34 ovpn-client1[3652]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 17 15:12:34 ovpn-client1[3652]: UDP link local: (not bound) Apr 17 15:12:34 ovpn-client1[3652]: UDP link remote: [AF_INET]185.9.18.163:1194 Apr 17 15:12:34 ovpn-client1[3652]: TLS: Initial packet from [AF_INET]185.9.18.163:1194, sid=f80eb15f 6ecb493f Apr 17 15:12:35 ovpn-client1[3652]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 15:12:35 ovpn-client1[3652]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 15:12:35 ovpn-client1[3652]: VERIFY KU OK Apr 17 15:12:35 ovpn-client1[3652]: Validating certificate extended key usage Apr 17 15:12:35 ovpn-client1[3652]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 15:12:35 ovpn-client1[3652]: VERIFY EKU OK Apr 17 15:12:35 ovpn-client1[3652]: VERIFY OK: depth=0, CN=ch224.nordvpn.com Apr 17 15:12:35 ovpn-client1[3652]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 15:12:35 ovpn-client1[3652]: [ch224.nordvpn.com] Peer Connection Initiated with [AF_INET]185.9.18.163:1194 Apr 17 15:12:35 custom_script: Running /jffs/scripts/service-event (args: start vpnclient2) Apr 17 15:12:35 ovpn-client2[3690]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Apr 17 15:12:35 ovpn-client2[3690]: OpenVPN 2.5.5 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 2 2022 Apr 17 15:12:35 ovpn-client2[3690]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.08 Apr 17 15:12:35 ovpn-client2[3691]: WARNING: --ping should normally be used with --ping-restart or --ping-exit Apr 17 15:12:35 ovpn-client2[3691]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 17 15:12:35 ovpn-client2[3691]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 15:12:35 ovpn-client2[3691]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 15:12:35 ovpn-client2[3691]: TCP/UDP: Preserving recently used remote address: [AF_INET]84.17.39.130:1194 Apr 17 15:12:35 ovpn-client2[3691]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 17 15:12:35 ovpn-client2[3691]: UDP link local: (not bound) Apr 17 15:12:35 ovpn-client2[3691]: UDP link remote: [AF_INET]84.17.39.130:1194 Apr 17 15:12:35 ovpn-client2[3691]: TLS: Initial packet from [AF_INET]84.17.39.130:1194, sid=ed30bfe3 48148be1 Apr 17 15:12:35 ovpn-client2[3691]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 15:12:35 ovpn-client2[3691]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 15:12:35 ovpn-client2[3691]: VERIFY KU OK Apr 17 15:12:35 ovpn-client2[3691]: Validating certificate extended key usage Apr 17 15:12:35 ovpn-client2[3691]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 15:12:35 ovpn-client2[3691]: VERIFY EKU OK Apr 17 15:12:35 ovpn-client2[3691]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 15:12:36 ovpn-client2[3691]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 15:12:36 ovpn-client2[3691]: [sg466.nordvpn.com] Peer Connection Initiated with [AF_INET]84.17.39.130:1194 Apr 17 15:12:36 ovpn-client1[3652]: SENT CONTROL [ch224.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 17 15:12:36 ovpn-client1[3652]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.5 255.255.255.0,peer-id 3,cipher AES-256-GCM' Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: timers and/or timeouts modified Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: compression parms modified Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 17 15:12:36 ovpn-client1[3652]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: --ifconfig/up options modified Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: route options modified Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: route-related options modified Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: peer-id set Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: adjusting link_mtu to 1656 Apr 17 15:12:36 ovpn-client1[3652]: OPTIONS IMPORT: data channel crypto options modified Apr 17 15:12:36 ovpn-client1[3652]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 17 15:12:36 ovpn-client1[3652]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:12:36 ovpn-client1[3652]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:12:36 ovpn-client1[3652]: TUN/TAP device tun11 opened Apr 17 15:12:36 ovpn-client1[3652]: TUN/TAP TX queue length set to 1000 Apr 17 15:12:36 ovpn-client1[3652]: /usr/sbin/ip link set dev tun11 up mtu 1500 Apr 17 15:12:36 ovpn-client1[3652]: /usr/sbin/ip link set dev tun11 up Apr 17 15:12:36 ovpn-client1[3652]: /usr/sbin/ip addr add dev tun11 10.8.0.5/24 Apr 17 15:12:36 ovpn-client1[3652]: ovpn-up 1 client tun11 1500 1584 10.8.0.5 255.255.255.0 init Apr 17 15:12:36 openvpn-routing: Setting client 1 routing table's default route through the tunnel Apr 17 15:12:37 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 17 15:12:37 openvpn: Forcing 192.168.1.34 to use DNS server 103.86.96.100 Apr 17 15:12:37 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 15:12:37 dnsmasq[1563]: using nameserver 203.150.218.161#53 Apr 17 15:12:37 dnsmasq[1563]: using nameserver 203.150.213.1#53 Apr 17 15:12:37 ovpn-client2[3691]: SENT CONTROL [sg466.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 17 15:12:37 ovpn-client2[3691]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.6 255.255.255.0,peer-id 4,cipher AES-256-GCM' Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: timers and/or timeouts modified Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: compression parms modified Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 17 15:12:37 ovpn-client2[3691]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: --ifconfig/up options modified Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: route options modified Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: route-related options modified Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: peer-id set Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: adjusting link_mtu to 1656 Apr 17 15:12:37 ovpn-client2[3691]: OPTIONS IMPORT: data channel crypto options modified Apr 17 15:12:37 ovpn-client2[3691]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 17 15:12:37 ovpn-client2[3691]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:12:37 ovpn-client2[3691]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:12:37 ovpn-client2[3691]: TUN/TAP device tun12 opened Apr 17 15:12:37 ovpn-client2[3691]: TUN/TAP TX queue length set to 1000 Apr 17 15:12:37 ovpn-client2[3691]: /usr/sbin/ip link set dev tun12 up mtu 1500 Apr 17 15:12:37 ovpn-client2[3691]: /usr/sbin/ip link set dev tun12 up Apr 17 15:12:37 ovpn-client2[3691]: /usr/sbin/ip addr add dev tun12 10.8.0.6/24 Apr 17 15:12:37 ovpn-client2[3691]: ovpn-up 2 client tun12 1500 1584 10.8.0.6 255.255.255.0 init Apr 17 15:12:37 openvpn-routing: Setting client 2 routing table's default route through the tunnel Apr 17 15:12:37 openvpn-routing: Routing iPhone 12 from 192.168.1.126 to any through ovpnc2 Apr 17 15:12:37 openvpn-routing: Routing iPad from 192.168.1.30 to any through ovpnc2 Apr 17 15:12:37 dnsmasq[1563]: read /etc/hosts - 6 addresses Apr 17 15:12:37 dnsmasq[1563]: using nameserver 203.150.218.161#53 Apr 17 15:12:37 dnsmasq[1563]: using nameserver 203.150.213.1#53 Apr 17 15:12:38 kernel: IDPfw: Exit IDPfw Apr 17 15:12:38 kernel: mod epilog takes 0 jiffies Apr 17 15:12:38 kernel: IDPfw: Exit IDPfw Apr 17 15:12:38 kernel: Exit chrdev /dev/idpfw with major 191 Apr 17 15:12:38 kernel: Exit chrdev /dev/idp with major 190 Apr 17 15:12:38 kernel: Init chrdev /dev/idp with major 190 Apr 17 15:12:38 kernel: tdts: tcp_conn_max = 8000 Apr 17 15:12:38 kernel: tdts: tcp_conn_timeout = 300 sec Apr 17 15:12:39 ovpn-client1[3652]: Initialization Sequence Completed Apr 17 15:12:39 ovpn-client2[3691]: Initialization Sequence Completed Apr 17 15:12:41 kernel: SHN Release Version: 2.0.2 90120f9 Apr 17 15:12:41 kernel: UDB Core Version: 0.2.20 Apr 17 15:12:41 kernel: Init chrdev /dev/idpfw with major 191 Apr 17 15:12:41 kernel: IDPfw: flush fc Apr 17 15:12:41 kernel: IDPfw: IDPfw is ready Apr 17 15:12:41 kernel: sizeof forward pkt param = 280 Apr 17 15:12:41 BWDPI: fun bitmap = 5ff Apr 17 15:12:41 A.QoS: qos_count=0, qos_check=0 Apr 17 15:12:44 rc_service: ip-up 3480:notify_rc stop_samba Apr 17 15:12:44 custom_script: Running /jffs/scripts/service-event (args: stop samba) Apr 17 15:12:44 rc_service: ip-up 3480:notify_rc start_samba Apr 17 15:12:44 rc_service: waitting "stop_samba" via ip-up ... Apr 17 15:12:44 wsdd2[1585]: Terminated received. Apr 17 15:12:44 wsdd2[1585]: terminating. Apr 17 15:12:44 Samba_Server: smb daemon is stopped Apr 17 15:12:45 custom_script: Running /jffs/scripts/service-event (args: start samba) Apr 17 15:12:45 dnsmasq[1563]: exiting on receipt of SIGTERM Apr 17 15:12:45 dnsmasq[4509]: started, version 2.85 cachesize 1500 Apr 17 15:12:45 dnsmasq[4509]: asynchronous logging enabled, queue limit is 5 messages Apr 17 15:12:45 dnsmasq-dhcp[4509]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d Apr 17 15:12:45 dnsmasq-dhcp[4509]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d Apr 17 15:12:45 dnsmasq-dhcp[4509]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d Apr 17 15:12:45 dnsmasq[4509]: read /etc/hosts - 6 addresses Apr 17 15:12:45 dnsmasq[4509]: using nameserver 203.150.218.161#53 Apr 17 15:12:45 dnsmasq[4509]: using nameserver 203.150.213.1#53 Apr 17 15:12:45 Samba_Server: daemon is started Apr 17 15:12:45 wsdd2[4527]: starting. Apr 17 15:12:49 dnsmasq[4509]: read /etc/hosts - 6 addresses Apr 17 15:12:49 dnsmasq[4509]: using nameserver 203.150.218.161#53 Apr 17 15:12:49 dnsmasq[4509]: using nameserver 203.150.213.1#53 Apr 17 15:12:50 zcip_client: configured 169.254.252.121 Apr 17 15:14:55 dropbear[5319]: Child connection from 192.168.1.21:50879 Apr 17 15:15:00 dropbear[5319]: Password auth succeeded for 'admin' from 192.168.1.21:50879 Apr 17 15:15:38 ovpn-client2[3691]: [sg466.nordvpn.com] Inactivity timeout (--ping-restart), restarting Apr 17 15:15:38 ovpn-client2[3691]: SIGUSR1[soft,ping-restart] received, process restarting Apr 17 15:15:38 ovpn-client2[3691]: Restart pause, 5 second(s) Apr 17 15:15:38 nextdns[5552]: Starting NextDNS 1.37.11/linux on 127.0.0.1:5342 Apr 17 15:15:38 nextdns[5552]: Listening on TCP/127.0.0.1:5342 Apr 17 15:15:38 nextdns[5552]: Starting mDNS discovery Apr 17 15:15:38 nextdns[5552]: Listening on UDP/127.0.0.1:5342 Apr 17 15:15:43 ovpn-client2[3691]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 17 15:15:43 ovpn-client2[3691]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 15:15:43 ovpn-client2[3691]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 15:15:43 ovpn-client2[3691]: TCP/UDP: Preserving recently used remote address: [AF_INET]84.17.39.130:1194 Apr 17 15:15:43 ovpn-client2[3691]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 17 15:15:43 ovpn-client2[3691]: UDP link local: (not bound) Apr 17 15:15:43 ovpn-client2[3691]: UDP link remote: [AF_INET]84.17.39.130:1194 Apr 17 15:15:43 ovpn-client2[3691]: TLS: Initial packet from [AF_INET]84.17.39.130:1194, sid=3cceded2 b96d69a6 Apr 17 15:15:43 ovpn-client2[3691]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 15:15:43 ovpn-client2[3691]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 15:15:43 ovpn-client2[3691]: VERIFY KU OK Apr 17 15:15:43 ovpn-client2[3691]: Validating certificate extended key usage Apr 17 15:15:43 ovpn-client2[3691]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 15:15:43 ovpn-client2[3691]: VERIFY EKU OK Apr 17 15:15:43 ovpn-client2[3691]: VERIFY OK: depth=0, CN=sg466.nordvpn.com Apr 17 15:15:43 nextdns[5552]: Setting up router Apr 17 15:15:43 rc_service: service 5611:notify_rc restart_dnsmasq Apr 17 15:15:43 nextdns[5552]: Activating Apr 17 15:15:43 custom_script: Running /jffs/scripts/service-event (args: restart dnsmasq) Apr 17 15:15:43 dnsmasq[4509]: exiting on receipt of SIGTERM Apr 17 15:15:43 custom_script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf) Apr 17 15:15:43 dnsmasq[5650]: started, version 2.85 cache disabled Apr 17 15:15:43 dnsmasq[5650]: asynchronous logging enabled, queue limit is 5 messages Apr 17 15:15:43 dnsmasq-dhcp[5650]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d Apr 17 15:15:43 dnsmasq-dhcp[5650]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d Apr 17 15:15:43 dnsmasq-dhcp[5650]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d Apr 17 15:15:43 ovpn-client2[3691]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 15:15:43 ovpn-client2[3691]: [sg466.nordvpn.com] Peer Connection Initiated with [AF_INET]84.17.39.130:1194 Apr 17 15:15:43 dnsmasq[5650]: using nameserver 127.0.0.1#5342 Apr 17 15:15:43 dnsmasq[5650]: read /etc/hosts - 6 addresses Apr 17 15:15:44 ovpn-client2[3691]: SENT CONTROL [sg466.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 17 15:15:44 ovpn-client2[3691]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.10 255.255.255.0,peer-id 6,cipher AES-256-GCM' Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: timers and/or timeouts modified Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: compression parms modified Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 17 15:15:44 ovpn-client2[3691]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: --ifconfig/up options modified Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: route options modified Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: route-related options modified Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: peer-id set Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: adjusting link_mtu to 1657 Apr 17 15:15:44 ovpn-client2[3691]: OPTIONS IMPORT: data channel crypto options modified Apr 17 15:15:44 ovpn-client2[3691]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 17 15:15:44 ovpn-client2[3691]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:15:44 ovpn-client2[3691]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 15:15:44 ovpn-client2[3691]: Preserving previous TUN/TAP instance: tun12 Apr 17 15:15:44 ovpn-client2[3691]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device. Apr 17 15:15:44 ovpn-client2[3691]: ovpn-route-pre-down tun12 1500 1585 10.8.0.6 255.255.255.0 init Apr 17 15:15:44 ovpn-client2[3691]: Closing TUN/TAP interface Apr 17 15:15:44 ovpn-client2[3691]: /usr/sbin/ip addr del dev tun12 10.8.0.6/24 Apr 17 15:15:44 lldpd[2080]: removal request for address of 10.8.0.6%104, but no knowledge of it Apr 17 15:15:44 ovpn-client2[3691]: ovpn-down 2 client tun12 1500 1585 10.8.0.6 255.255.255.0 init Apr 17 15:15:44 openvpn-routing: Configured killswitch on VPN client 2 Apr 17 15:15:44 dnsmasq[5650]: read /etc/hosts - 6 addresses Apr 17 15:15:45 ovpn-client2[3691]: TUN/TAP device tun12 opened Apr 17 15:15:45 ovpn-client2[3691]: TUN/TAP TX queue length set to 1000 Apr 17 15:15:45 ovpn-client2[3691]: /usr/sbin/ip link set dev tun12 up mtu 1500 Apr 17 15:15:45 ovpn-client2[3691]: /usr/sbin/ip link set dev tun12 up Apr 17 15:15:45 ovpn-client2[3691]: /usr/sbin/ip addr add dev tun12 10.8.0.10/24 Apr 17 15:15:45 ovpn-client2[3691]: ovpn-up 2 client tun12 1500 1585 10.8.0.10 255.255.255.0 init Apr 17 15:15:45 openvpn-routing: Setting client 2 routing table's default route through the tunnel Apr 17 15:15:45 openvpn-routing: Routing iPhone 12 from 192.168.1.126 to any through ovpnc2 Apr 17 15:15:45 openvpn-routing: Routing iPad from 192.168.1.30 to any through ovpnc2 Apr 17 15:15:45 dnsmasq[5650]: read /etc/hosts - 6 addresses Apr 17 15:15:47 ovpn-client2[3691]: Initialization Sequence Completed Apr 17 15:15:53 nextdns[5552]: Connected 45.90.28.0:443 (con=27ms tls=613ms, TCP, TLS13) Apr 17 15:15:54 nextdns[5552]: Connected 116.204.183.61:443 (con=3ms tls=396ms, TCP, TLS13) Apr 17 15:15:54 nextdns[5552]: Switching endpoint: https://dns.nextdns.io#116.204.183.61,43.229.79.19 Apr 17 15:16:29 nextdns[5552]: Received signal: terminated Apr 17 15:16:29 nextdns[5552]: Stopping NextDNS 1.37.11/linux Apr 17 15:16:29 nextdns[5552]: Restore router settings Apr 17 15:16:29 rc_service: service 5968:notify_rc restart_dnsmasq Apr 17 15:16:29 custom_script: Running /jffs/scripts/service-event (args: restart dnsmasq) Apr 17 15:16:29 nextdns[5552]: Deactivating Apr 17 15:16:29 nextdns[5552]: NextDNS 1.37.11/linux stopped Apr 17 15:16:29 dnsmasq[5650]: exiting on receipt of SIGTERM Apr 17 15:16:29 dnsmasq[5980]: started, version 2.85 cachesize 1500 Apr 17 15:16:29 dnsmasq[5980]: asynchronous logging enabled, queue limit is 5 messages Apr 17 15:16:29 dnsmasq-dhcp[5980]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d Apr 17 15:16:29 dnsmasq-dhcp[5980]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d Apr 17 15:16:29 dnsmasq-dhcp[5980]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d Apr 17 15:16:29 dnsmasq[5980]: read /etc/hosts - 6 addresses Apr 17 15:16:29 dnsmasq[5980]: using nameserver 203.150.218.161#53 Apr 17 15:16:29 dnsmasq[5980]: using nameserver 203.150.213.1#53 Apr 17 15:16:30 nextdns.init: Stopped Apr 17 15:16:30 nextdns[6036]: Starting NextDNS 1.37.11/linux on 127.0.0.1:5342 Apr 17 15:16:30 nextdns[6036]: Listening on TCP/127.0.0.1:5342 Apr 17 15:16:30 nextdns[6036]: Starting mDNS discovery Apr 17 15:16:30 nextdns[6036]: Listening on UDP/127.0.0.1:5342 Apr 17 15:16:35 nextdns[6036]: Setting up router Apr 17 15:16:35 rc_service: service 6095:notify_rc restart_dnsmasq Apr 17 15:16:35 nextdns[6036]: Activating Apr 17 15:16:35 custom_script: Running /jffs/scripts/service-event (args: restart dnsmasq) Apr 17 15:16:35 dnsmasq[5980]: exiting on receipt of SIGTERM Apr 17 15:16:35 custom_script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf) Apr 17 15:16:35 dnsmasq[6135]: started, version 2.85 cache disabled Apr 17 15:16:35 dnsmasq[6135]: asynchronous logging enabled, queue limit is 5 messages Apr 17 15:16:35 dnsmasq-dhcp[6135]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d Apr 17 15:16:35 dnsmasq-dhcp[6135]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d Apr 17 15:16:35 dnsmasq-dhcp[6135]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d Apr 17 15:16:35 dnsmasq[6135]: using nameserver 127.0.0.1#5342 Apr 17 15:16:35 dnsmasq[6135]: read /etc/hosts - 6 addresses Apr 17 15:16:36 nextdns[6036]: Connected 45.90.28.0:443 (con=31ms tls=0ms, TCP, ) Apr 17 15:16:36 nextdns[6036]: Connected 116.204.183.61:443 (con=17ms tls=429ms, TCP, TLS13) Apr 17 15:16:36 nextdns[6036]: Switching endpoint: https://dns.nextdns.io#43.229.79.19,116.204.183.61 Apr 17 15:17:03 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON Apr 17 15:17:03 rc_service: httpd 1246:notify_rc restart_ddns Apr 17 15:17:03 custom_script: Running /jffs/scripts/service-event (args: restart ddns) Apr 17 15:17:03 start_ddns: update WWW.NO-IP.COM default@no-ip.com, wan_unit 0 Apr 17 15:17:03 start_ddns: Clear ddns cache. Apr 17 15:17:03 start_ddns: Start Inadyn(10). Apr 17 15:17:03 inadyn[6238]: In-a-dyn version 2.9.1 -- Dynamic DNS update client. Apr 17 15:17:03 inadyn[6238]: Update forced for alias ekkamai2022.ddns.net, new IP# 100.64.21.215 Apr 17 15:17:09 inadyn[6238]: Updating cache for ekkamai2022.ddns.net Apr 17 15:17:40 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 15:19:03 dropbear[5319]: Exit (admin) from <192.168.1.21:50879>: Exited normally Apr 17 15:19:03 nextdns[6036]: Received signal: hangup (ignored) Apr 17 15:19:03 nextdns[6036]: Received signal: continued (ignored) Apr 17 15:19:59 kernel: httpd (1246): drop_caches: 1 Apr 17 15:22:05 nextdns[6036]: Connected 43.229.79.19:443 (con=12ms tls=9ms, TCP, TLS13) Apr 17 15:23:25 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 15:24:42 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=13ms, TCP, TLS13) Apr 17 15:27:00 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=11ms, TCP, TLS13) Apr 17 15:28:08 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 17 15:28:58 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 15:31:38 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 17 15:33:15 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 15:35:49 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=15ms, TCP, TLS13) Apr 17 15:36:42 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=10ms, TCP, TLS13) Apr 17 15:37:32 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=16ms, TCP, TLS13) Apr 17 15:38:07 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=12ms, TCP, TLS13) Apr 17 15:39:11 nextdns[6036]: Connected 43.229.79.19:443 (con=12ms tls=20ms, TCP, TLS13) Apr 17 15:40:11 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 15:43:54 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 15:45:12 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 15:46:20 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=15ms, TCP, TLS13) Apr 17 15:46:56 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 15:47:52 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 15:51:20 nextdns[6036]: Connected 43.229.79.19:443 (con=9ms tls=15ms, TCP, TLS13) Apr 17 15:52:38 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=0ms, TCP, ) Apr 17 15:53:54 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 15:56:46 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 15:58:39 kernel: httpd (1246): drop_caches: 1 Apr 17 15:58:41 kernel: httpds (1245): drop_caches: 1 Apr 17 15:58:59 rc_service: httpds 1245:notify_rc stop_vpnclient2 Apr 17 15:58:59 custom_script: Running /jffs/scripts/service-event (args: stop vpnclient2) Apr 17 15:58:59 ovpn-client2[3691]: event_wait : Interrupted system call (code=4) Apr 17 15:58:59 ovpn-client2[3691]: SIGTERM received, sending exit notification to peer Apr 17 15:59:00 ovpn-client2[3691]: ovpn-route-pre-down tun12 1500 1585 10.8.0.10 255.255.255.0 init Apr 17 15:59:00 ovpn-client2[3691]: Closing TUN/TAP interface Apr 17 15:59:00 ovpn-client2[3691]: /usr/sbin/ip addr del dev tun12 10.8.0.10/24 Apr 17 15:59:00 lldpd[2080]: removal request for address of 10.8.0.10%104, but no knowledge of it Apr 17 15:59:00 ovpn-client2[3691]: ovpn-down 2 client tun12 1500 1585 10.8.0.10 255.255.255.0 init Apr 17 15:59:00 openvpn-routing: Configured killswitch on VPN client 2 Apr 17 15:59:00 dnsmasq[6135]: read /etc/hosts - 6 addresses Apr 17 15:59:00 ovpn-client2[3691]: SIGTERM[soft,exit-with-notification] received, process exiting Apr 17 15:59:00 openvpn-routing: Clearing routing table for VPN client 2 Apr 17 15:59:10 rc_service: httpds 1245:notify_rc restart_vpnrouting0 Apr 17 15:59:10 custom_script: Running /jffs/scripts/service-event (args: restart vpnrouting0) Apr 17 15:59:11 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 17 15:59:11 openvpn: Forcing 192.168.1.34 to use DNS server 103.86.96.100 Apr 17 15:59:14 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 06:7A:56:5E:6B:8D, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 15:59:17 wlceventd: wlceventd_proc_event(527): eth6: Auth 06:7A:56:5E:6B:8D, status: Successful (0), rssi:0 Apr 17 15:59:17 wlceventd: wlceventd_proc_event(556): eth6: Assoc 06:7A:56:5E:6B:8D, status: Successful (0), rssi:0 Apr 17 15:59:17 dnsmasq-dhcp[6135]: DHCPREQUEST(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 15:59:17 dnsmasq-dhcp[6135]: DHCPACK(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 17 15:59:38 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 16:00:22 rc_service: httpds 1245:notify_rc restart_dnsfilter Apr 17 16:00:22 custom_script: Running /jffs/scripts/service-event (args: restart dnsfilter) Apr 17 16:00:23 dnsmasq[6135]: exiting on receipt of SIGTERM Apr 17 16:00:23 custom_script: Running /jffs/scripts/dnsmasq.postconf (args: /etc/dnsmasq.conf) Apr 17 16:00:23 dnsmasq[11800]: started, version 2.85 cache disabled Apr 17 16:00:23 dnsmasq[11800]: asynchronous logging enabled, queue limit is 5 messages Apr 17 16:00:23 dnsmasq-dhcp[11800]: DHCP, IP range 192.168.102.2 -- 192.168.102.254, lease time 1d Apr 17 16:00:23 dnsmasq-dhcp[11800]: DHCP, IP range 192.168.101.2 -- 192.168.101.254, lease time 1d Apr 17 16:00:23 dnsmasq-dhcp[11800]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d Apr 17 16:00:23 dnsmasq[11800]: using nameserver 127.0.0.1#5342 Apr 17 16:00:23 dnsmasq[11800]: read /etc/hosts - 6 addresses Apr 17 16:00:28 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=9ms, TCP, TLS13) Apr 17 16:01:15 rc_service: httpds 1245:notify_rc start_vpnmgr Apr 17 16:01:15 custom_script: Running /jffs/scripts/service-event (args: start vpnmgr) Apr 17 16:01:15 vpnmgr: Updated settings from WebUI found, merging into /jffs/addons/vpnmgr.d/config Apr 17 16:01:16 vpnmgr: Merge of updated settings from WebUI completed successfully Apr 17 16:01:16 vpnmgr: Enabling management of VPN client 1 Apr 17 16:01:16 vpnmgr: Management of VPN client 1 successfully enabled Apr 17 16:01:16 vpnmgr: Configuring scheduled update for VPN client 1 Apr 17 16:01:16 vpnmgr: Scheduled update created for VPN client 1 Apr 17 16:01:16 vpnmgr: Retrieving recommended VPN server using NordVPN API with below parameters Apr 17 16:01:16 vpnmgr: Protocol: UDP - Type: Standard - Country: Switzerland - City: Zurich Apr 17 16:01:29 vpnmgr: Updating VPN client 1 to NordVPN server Apr 17 16:01:29 rc_service: service 13494:notify_rc restart_vpnclient1 Apr 17 16:01:29 custom_script: Running /jffs/scripts/service-event (args: restart vpnclient1) Apr 17 16:01:29 vpnmgr: VPN client 1 updated successfully (CH297 Standard UDP) Apr 17 16:01:29 ovpn-client1[3652]: SIGTERM received, sending exit notification to peer Apr 17 16:01:29 vpnmgr: Removing management of VPN client 2 Apr 17 16:01:29 vpnmgr: Removing scheduled update for VPN client 2 Apr 17 16:01:29 vpnmgr: Scheduled update cancelled for VPN client 2 Apr 17 16:01:29 vpnmgr: Management of VPN client 2 successfully removed Apr 17 16:01:29 vpnmgr: Removing management of VPN client 3 Apr 17 16:01:29 vpnmgr: Removing scheduled update for VPN client 3 Apr 17 16:01:29 vpnmgr: Scheduled update cancelled for VPN client 3 Apr 17 16:01:29 vpnmgr: Management of VPN client 3 successfully removed Apr 17 16:01:29 vpnmgr: Removing management of VPN client 4 Apr 17 16:01:29 vpnmgr: Removing scheduled update for VPN client 4 Apr 17 16:01:29 vpnmgr: Scheduled update cancelled for VPN client 4 Apr 17 16:01:29 vpnmgr: Management of VPN client 4 successfully removed Apr 17 16:01:29 vpnmgr: Removing management of VPN client 5 Apr 17 16:01:29 vpnmgr: Removing scheduled update for VPN client 5 Apr 17 16:01:29 vpnmgr: Scheduled update cancelled for VPN client 5 Apr 17 16:01:29 vpnmgr: Management of VPN client 5 successfully removed Apr 17 16:01:30 ovpn-client1[3652]: ovpn-route-pre-down tun11 1500 1584 10.8.0.5 255.255.255.0 init Apr 17 16:01:30 ovpn-client1[3652]: Closing TUN/TAP interface Apr 17 16:01:30 ovpn-client1[3652]: /usr/sbin/ip addr del dev tun11 10.8.0.5/24 Apr 17 16:01:30 lldpd[2080]: removal request for address of 10.8.0.5%103, but no knowledge of it Apr 17 16:01:30 ovpn-client1[3652]: ovpn-down 1 client tun11 1500 1584 10.8.0.5 255.255.255.0 init Apr 17 16:01:30 openvpn-routing: Configured killswitch on VPN client 1 Apr 17 16:01:30 dnsmasq[11800]: read /etc/hosts - 6 addresses Apr 17 16:01:30 ovpn-client1[3652]: SIGTERM[soft,exit-with-notification] received, process exiting Apr 17 16:01:30 openvpn-routing: Clearing routing table for VPN client 1 Apr 17 16:01:30 ovpn-client1[13751]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Apr 17 16:01:30 ovpn-client1[13751]: OpenVPN 2.5.5 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 2 2022 Apr 17 16:01:30 ovpn-client1[13751]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.08 Apr 17 16:01:30 ovpn-client1[13752]: WARNING: --ping should normally be used with --ping-restart or --ping-exit Apr 17 16:01:30 ovpn-client1[13752]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 17 16:01:30 ovpn-client1[13752]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 16:01:30 ovpn-client1[13752]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 16:01:30 ovpn-client1[13752]: TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.213.91:1194 Apr 17 16:01:30 ovpn-client1[13752]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 17 16:01:30 ovpn-client1[13752]: UDP link local: (not bound) Apr 17 16:01:30 ovpn-client1[13752]: UDP link remote: [AF_INET]37.120.213.91:1194 Apr 17 16:01:30 ovpn-client1[13752]: TLS: Initial packet from [AF_INET]37.120.213.91:1194, sid=46af7dcb 69202ee3 Apr 17 16:01:30 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=11ms, TCP, TLS13) Apr 17 16:01:30 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 16:01:30 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 16:01:30 ovpn-client1[13752]: VERIFY KU OK Apr 17 16:01:30 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 16:01:30 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 16:01:30 ovpn-client1[13752]: VERIFY EKU OK Apr 17 16:01:30 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 16:01:31 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 16:01:31 ovpn-client1[13752]: [ch297.nordvpn.com] Peer Connection Initiated with [AF_INET]37.120.213.91:1194 Apr 17 16:01:32 ovpn-client1[13752]: SENT CONTROL [ch297.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 17 16:01:32 ovpn-client1[13752]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.2.8 255.255.255.0,peer-id 8,cipher AES-256-GCM' Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: timers and/or timeouts modified Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: compression parms modified Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 17 16:01:32 ovpn-client1[13752]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: --ifconfig/up options modified Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: route options modified Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: route-related options modified Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: peer-id set Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: adjusting link_mtu to 1656 Apr 17 16:01:32 ovpn-client1[13752]: OPTIONS IMPORT: data channel crypto options modified Apr 17 16:01:32 ovpn-client1[13752]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 17 16:01:32 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 16:01:32 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 16:01:32 ovpn-client1[13752]: TUN/TAP device tun11 opened Apr 17 16:01:32 ovpn-client1[13752]: TUN/TAP TX queue length set to 1000 Apr 17 16:01:32 ovpn-client1[13752]: /usr/sbin/ip link set dev tun11 up mtu 1500 Apr 17 16:01:32 ovpn-client1[13752]: /usr/sbin/ip link set dev tun11 up Apr 17 16:01:32 ovpn-client1[13752]: /usr/sbin/ip addr add dev tun11 10.8.2.8/24 Apr 17 16:01:32 ovpn-client1[13752]: ovpn-up 1 client tun11 1500 1584 10.8.2.8 255.255.255.0 init Apr 17 16:01:32 openvpn-routing: Setting client 1 routing table's default route through the tunnel Apr 17 16:01:32 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 17 16:01:32 openvpn: Forcing 192.168.1.34 to use DNS server 103.86.96.100 Apr 17 16:01:32 dnsmasq[11800]: read /etc/hosts - 6 addresses Apr 17 16:01:34 ovpn-client1[13752]: Initialization Sequence Completed Apr 17 16:01:43 rc_service: httpds 1245:notify_rc stop_vpnclient2;clearvpnclient2 Apr 17 16:01:43 custom_script: Running /jffs/scripts/service-event (args: stop vpnclient2) Apr 17 16:01:43 openvpn-routing: Clearing routing table for VPN client 2 Apr 17 16:01:44 custom_script: Running /jffs/scripts/service-event (args: clearvpnclient2) Apr 17 16:01:44 openvpn: Resetting VPN client 2 to default settings Apr 17 16:02:09 rc_service: httpds 1245:notify_rc stop_vpnclient3;clearvpnclient3 Apr 17 16:02:09 custom_script: Running /jffs/scripts/service-event (args: stop vpnclient3) Apr 17 16:02:10 openvpn-routing: Clearing routing table for VPN client 3 Apr 17 16:02:10 custom_script: Running /jffs/scripts/service-event (args: clearvpnclient3) Apr 17 16:02:10 openvpn: Resetting VPN client 3 to default settings Apr 17 16:02:36 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 16:05:04 rc_service: httpds 1245:notify_rc start_release_note RT-AC86U 386_5_2 Apr 17 16:05:04 custom_script: Running /jffs/scripts/service-event (args: start release_note) Apr 17 16:05:33 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=13ms, TCP, TLS13) Apr 17 16:11:18 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 16:12:07 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:0 Apr 17 16:12:07 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 16:12:07 wlceventd: wlceventd_proc_event(537): eth6: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 16:13:58 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 16:16:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 16:16:57 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 17 16:19:42 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=16ms, TCP, TLS13) Apr 17 16:20:57 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 16:21:35 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 16:23:49 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 16:24:33 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 16:26:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 16:27:02 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 16:27:36 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 16:28:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 17 16:31:02 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 16:32:44 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 16:32:44 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 16:32:55 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 17 16:34:25 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 16:35:04 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=13ms, TCP, TLS13) Apr 17 16:36:23 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 17 16:36:51 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 16:36:51 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 16:36:51 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 16:36:51 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 16:37:06 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 16:37:06 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 16:37:34 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 16:39:06 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=18ms, TCP, TLS13) Apr 17 16:40:42 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 16:42:09 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 16:43:54 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 16:45:15 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 17 16:45:53 nextdns[6036]: Connected 116.204.183.61:443 (con=33ms tls=24ms, TCP, TLS13) Apr 17 16:47:03 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 16:48:28 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=13ms, TCP, TLS13) Apr 17 16:49:50 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=13ms, TCP, TLS13) Apr 17 16:50:31 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 16:51:43 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 16:52:41 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 16:53:50 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 16:55:41 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 16:56:40 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 17 16:57:56 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=11ms, TCP, TLS13) Apr 17 16:59:23 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 17:00:29 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:00:29 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:00:29 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:00:29 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:00:43 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:00:43 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:00:51 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:00:51 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:00:51 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:00:51 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:01:21 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:01:21 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:01:31 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 17:01:31 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 17:01:31 ovpn-client1[13752]: VERIFY KU OK Apr 17 17:01:31 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 17:01:31 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 17:01:31 ovpn-client1[13752]: VERIFY EKU OK Apr 17 17:01:31 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 17:01:32 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 17:01:32 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 17:01:32 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 17:01:35 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 17:07:57 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=9ms, TCP, TLS13) Apr 17 17:08:57 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 17:10:16 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 17 17:12:42 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=26ms, TCP, TLS13) Apr 17 17:13:32 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=13ms, TCP, TLS13) Apr 17 17:16:43 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 17:16:44 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=399ms, TCP, TLS13) Apr 17 17:16:44 nextdns[6036]: Switching endpoint: https://dns.nextdns.io#116.204.183.61,43.229.79.19 Apr 17 17:17:48 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 17:19:02 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=14ms, TCP, TLS13) Apr 17 17:21:09 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 17:23:41 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 17:24:16 nextdns[6036]: Connected 43.229.79.19:443 (con=13ms tls=14ms, TCP, TLS13) Apr 17 17:24:55 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 17:26:47 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=16ms, TCP, TLS13) Apr 17 17:26:54 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:26:54 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:26:54 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:26:54 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:27:01 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:27:01 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:27:06 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:27:06 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:27:06 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:27:06 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:27:18 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:27:18 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:28:42 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 17:30:58 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 17:31:54 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:31:54 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:31:54 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:31:54 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:31:57 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 17 17:31:58 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:31:58 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:33:15 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 17:35:04 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 17:35:53 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:35:53 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:35:53 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:35:53 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:36:08 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:36:08 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:36:41 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 17:37:47 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:37:47 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:37:47 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:37:47 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:37:56 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:37:56 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:38:05 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 17 17:39:26 nextdns[6036]: Connected 43.229.79.19:443 (con=23ms tls=14ms, TCP, TLS13) Apr 17 17:40:09 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 17:41:30 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=17ms, TCP, TLS13) Apr 17 17:42:33 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 17 17:43:18 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=15ms, TCP, TLS13) Apr 17 17:44:02 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:44:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:44:02 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:44:02 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:44:07 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:44:07 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:44:34 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 17:44:40 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:44:40 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:44:40 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:44:40 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:44:48 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:44:48 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:46:15 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 17:47:11 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 17:48:06 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 17:49:21 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=17ms, TCP, TLS13) Apr 17 17:50:02 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:50:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:50:02 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:50:02 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:50:06 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:50:06 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:50:52 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:50:52 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:50:52 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:50:52 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:50:56 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:50:56 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:51:24 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 17:54:33 nextdns[6036]: Connected 116.204.183.61:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 17:54:41 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:54:41 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:54:41 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:54:41 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:54:51 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:54:51 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:57:25 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 17:58:16 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=13ms, TCP, TLS13) Apr 17 17:58:46 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:58:46 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 17:58:46 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:58:46 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 17:59:02 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:59:02 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 17:59:33 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 18:00:41 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 18:01:32 ovpn-client1[13752]: TLS: tls_process: killed expiring key Apr 17 18:01:33 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 18:01:33 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 18:01:33 ovpn-client1[13752]: VERIFY KU OK Apr 17 18:01:33 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 18:01:33 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 18:01:33 ovpn-client1[13752]: VERIFY EKU OK Apr 17 18:01:33 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 18:01:33 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 18:01:33 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 18:01:33 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 18:02:35 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=11ms, TCP, TLS13) Apr 17 18:04:14 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=17ms, TCP, TLS13) Apr 17 18:04:53 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 18:05:02 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:05:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:05:02 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:05:02 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:05:09 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:05:09 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:05:57 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:05:57 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:05:57 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:05:57 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:06:15 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:06:15 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:06:34 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:06:34 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:06:34 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:06:34 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:06:38 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:06:38 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:07:39 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 18:11:56 nextdns[6036]: Connected 43.229.79.19:443 (con=33ms tls=0ms, TCP, ) Apr 17 18:13:47 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=10ms, TCP, TLS13) Apr 17 18:15:01 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 18:15:49 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 18:15:59 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:15:59 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:15:59 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:15:59 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:16:06 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:16:06 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:16:26 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:16:26 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:16:27 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:16:27 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:16:33 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:16:33 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:16:42 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 18:18:12 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 18:19:32 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 18:20:31 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=13ms, TCP, TLS13) Apr 17 18:22:26 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=21ms, TCP, TLS13) Apr 17 18:24:28 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 18:25:15 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 18:26:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 18:26:27 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:26:27 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:26:27 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:26:27 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:26:31 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:26:31 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:26:55 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 17 18:27:12 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:27:12 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:27:12 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:27:12 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:27:15 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:27:15 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:27:22 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:27:22 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:27:22 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:27:22 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:27:23 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:27:23 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:27:40 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 18:28:40 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=11ms, TCP, TLS13) Apr 17 18:29:47 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 18:30:24 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 18:31:03 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:31:03 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:31:03 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:31:03 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:31:07 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:31:07 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:31:49 nextdns[6036]: Connected 43.229.79.19:443 (con=24ms tls=21ms, TCP, TLS13) Apr 17 18:32:42 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 18:34:00 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 18:35:33 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 18:37:36 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 18:38:33 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=11ms, TCP, TLS13) Apr 17 18:39:33 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:39:33 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:39:33 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:39:33 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:39:38 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:39:38 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:40:22 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 17 18:46:13 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:46:13 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:46:13 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:46:13 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:46:16 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:46:16 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:47:49 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=14ms, TCP, TLS13) Apr 17 18:48:42 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 18:49:26 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:49:26 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:49:26 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:49:26 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:49:36 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:49:36 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:50:07 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 18:53:18 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 17 18:58:41 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 17 18:58:54 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:58:54 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 18:58:55 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:58:55 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 18:59:02 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 18:59:02 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:00:01 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:00:01 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:00:01 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:00:01 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:00:16 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:00:16 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:01:30 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 19:01:33 ovpn-client1[13752]: TLS: tls_process: killed expiring key Apr 17 19:01:34 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 19:01:34 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 19:01:34 ovpn-client1[13752]: VERIFY KU OK Apr 17 19:01:34 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 19:01:34 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 19:01:34 ovpn-client1[13752]: VERIFY EKU OK Apr 17 19:01:34 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 19:01:34 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 19:01:34 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 19:01:34 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 19:03:19 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 19:04:11 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:04:11 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:04:11 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:04:11 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:04:13 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:04:13 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:04:41 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=11ms, TCP, TLS13) Apr 17 19:05:37 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 19:08:28 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 19:08:57 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:08:57 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:08:57 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:08:57 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:08:58 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:08:58 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:09:09 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 19:09:11 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:09:11 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:12:23 nextdns[6036]: Connected 116.204.183.61:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 19:15:20 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 17 19:15:35 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:15:35 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:15:35 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:15:35 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:15:39 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:15:39 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:16:18 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 19:16:32 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:16:32 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:16:32 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:16:32 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:16:36 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:16:36 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:16:49 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 19:18:32 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=0ms, TCP, ) Apr 17 19:19:49 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 19:20:38 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=11ms, TCP, TLS13) Apr 17 19:21:40 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=13ms, TCP, TLS13) Apr 17 19:23:16 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:23:16 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:23:16 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:23:16 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:23:18 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:23:18 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:23:54 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 19:24:02 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:24:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 17 19:24:02 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:24:02 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:24:02 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:24:02 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 17 19:24:13 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:24:13 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 19:27:05 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 19:28:14 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 19:29:31 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 19:30:16 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=11ms, TCP, TLS13) Apr 17 19:30:50 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 19:33:07 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=13ms, TCP, TLS13) Apr 17 19:35:39 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 19:36:34 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=14ms, TCP, TLS13) Apr 17 19:37:32 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=9ms, TCP, TLS13) Apr 17 19:38:02 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=0ms, TCP, ) Apr 17 19:38:39 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 19:39:33 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 19:40:35 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 19:41:33 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 17 19:42:36 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=8ms, TCP, TLS13) Apr 17 19:43:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 19:45:54 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=13ms, TCP, TLS13) Apr 17 19:47:10 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 19:49:14 nextdns[6036]: Connected 116.204.183.61:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 19:50:38 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=16ms, TCP, TLS13) Apr 17 19:51:48 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=19ms, TCP, TLS13) Apr 17 19:52:34 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 17 19:56:44 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 19:57:37 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 19:58:42 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 19:59:35 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 20:00:52 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 20:01:34 ovpn-client1[13752]: TLS: tls_process: killed expiring key Apr 17 20:01:36 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 20:01:36 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 20:01:36 ovpn-client1[13752]: VERIFY KU OK Apr 17 20:01:36 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 20:01:36 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 20:01:36 ovpn-client1[13752]: VERIFY EKU OK Apr 17 20:01:36 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 20:01:36 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 20:01:36 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 20:01:36 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 20:02:32 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=15ms, TCP, TLS13) Apr 17 20:03:20 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 20:05:28 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 20:12:40 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=11ms, TCP, TLS13) Apr 17 20:13:15 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 20:14:30 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=0ms, TCP, ) Apr 17 20:23:19 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 20:23:44 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 20:23:54 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 20:23:54 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 17 20:23:55 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 20:23:55 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 17 20:26:08 nextdns[6036]: Connected 43.229.79.19:443 (con=17ms tls=14ms, TCP, TLS13) Apr 17 20:29:54 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=10ms, TCP, TLS13) Apr 17 20:32:00 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=9ms, TCP, TLS13) Apr 17 20:33:27 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 20:34:32 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 17 20:35:15 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=11ms, TCP, TLS13) Apr 17 20:36:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 20:36:17 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Apr 17 20:36:17 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Office Apr 17 20:36:55 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 20:38:03 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 20:40:40 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 17 20:41:36 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 20:43:01 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=11ms, TCP, TLS13) Apr 17 20:44:23 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 20:45:25 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=9ms, TCP, TLS13) Apr 17 20:46:59 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 20:47:36 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 20:48:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 17 20:49:32 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 20:50:29 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=0ms, TCP, ) Apr 17 20:52:10 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 20:53:03 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 20:54:06 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 20:55:07 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 3C:A6:F6:6C:B1:C8, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 17 20:55:07 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 3C:A6:F6:6C:B1:C8, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 17 20:56:21 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 17 20:58:47 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 20:59:45 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 21:00:48 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 21:01:36 ovpn-client1[13752]: TLS: tls_process: killed expiring key Apr 17 21:01:37 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 21:01:37 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 21:01:37 ovpn-client1[13752]: VERIFY KU OK Apr 17 21:01:37 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 21:01:37 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 21:01:37 ovpn-client1[13752]: VERIFY EKU OK Apr 17 21:01:37 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 21:01:37 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 21:01:37 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 21:01:37 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 21:02:10 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 21:02:56 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 21:04:05 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=10ms, TCP, TLS13) Apr 17 21:05:32 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 21:06:18 nextdns[6036]: Connected 43.229.79.19:443 (con=12ms tls=0ms, TCP, ) Apr 17 21:07:51 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 21:08:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 17 21:11:15 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=11ms, TCP, TLS13) Apr 17 21:11:49 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=11ms, TCP, TLS13) Apr 17 21:12:42 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 21:13:48 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 21:14:23 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 21:17:40 nextdns[6036]: Connected 116.204.183.61:443 (con=2ms tls=418ms, TCP, TLS13) Apr 17 21:17:40 nextdns[6036]: Switching endpoint: https://dns.nextdns.io#43.229.79.19,116.204.183.61 Apr 17 21:18:18 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=11ms, TCP, TLS13) Apr 17 21:20:16 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=11ms, TCP, TLS13) Apr 17 21:21:18 nextdns[6036]: Connected 43.229.79.19:443 (con=18ms tls=14ms, TCP, TLS13) Apr 17 21:22:58 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 21:26:22 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Apr 17 21:26:22 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Wohnzimmer Apr 17 21:29:35 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 17 21:35:18 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=8ms, TCP, TLS13) Apr 17 21:36:57 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=13ms, TCP, TLS13) Apr 17 21:38:47 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=0ms, TCP, ) Apr 17 21:40:37 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.172 58:d3:49:30:0f:e2 Apr 17 21:40:37 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.172 58:d3:49:30:0f:e2 Bedroom Apr 17 21:49:20 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 21:50:26 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 21:51:20 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 21:52:13 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=13ms, TCP, TLS13) Apr 17 21:53:20 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 21:54:25 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 17 21:54:58 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=13ms, TCP, TLS13) Apr 17 21:55:55 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=11ms, TCP, TLS13) Apr 17 21:56:48 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 21:57:44 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=13ms, TCP, TLS13) Apr 17 21:59:34 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 22:00:20 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 22:01:38 ovpn-client1[13752]: TLS: tls_process: killed expiring key Apr 17 22:01:38 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 22:01:38 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 22:01:38 ovpn-client1[13752]: VERIFY KU OK Apr 17 22:01:38 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 22:01:38 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 22:01:38 ovpn-client1[13752]: VERIFY EKU OK Apr 17 22:01:38 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 22:01:39 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 22:01:39 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 22:01:39 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 22:01:49 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=14ms, TCP, TLS13) Apr 17 22:03:04 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 22:04:22 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 22:06:29 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 22:07:00 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 17 22:11:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=18ms, TCP, TLS13) Apr 17 22:12:44 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 22:15:14 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=8ms, TCP, TLS13) Apr 17 22:15:49 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 22:16:50 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 17 22:18:09 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 22:20:31 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 22:21:51 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=11ms, TCP, TLS13) Apr 17 22:23:57 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=0ms, TCP, ) Apr 17 22:24:52 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=11ms, TCP, TLS13) Apr 17 22:26:51 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 22:28:33 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 17 22:30:05 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 22:31:14 nextdns[6036]: Connected 43.229.79.19:443 (con=10ms tls=16ms, TCP, TLS13) Apr 17 22:31:49 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=13ms, TCP, TLS13) Apr 17 22:33:11 nextdns[6036]: Connected 116.204.183.61:443 (con=16ms tls=16ms, TCP, TLS13) Apr 17 22:35:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 22:36:33 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 17 22:41:06 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=15ms, TCP, TLS13) Apr 17 22:42:28 nextdns[6036]: Connected 116.204.183.61:443 (con=11ms tls=15ms, TCP, TLS13) Apr 17 22:43:33 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=9ms, TCP, TLS13) Apr 17 22:44:35 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 22:45:16 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=15ms, TCP, TLS13) Apr 17 22:46:12 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 22:47:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 22:47:48 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 22:48:20 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 22:50:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 22:52:43 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 22:53:55 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 17 22:56:58 nextdns[6036]: Connected 43.229.79.19:443 (con=24ms tls=12ms, TCP, TLS13) Apr 17 22:57:36 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 23:00:56 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 23:01:38 ovpn-client1[13752]: TLS: tls_process: killed expiring key Apr 17 23:01:39 ovpn-client1[13752]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 23:01:39 ovpn-client1[13752]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 23:01:39 ovpn-client1[13752]: VERIFY KU OK Apr 17 23:01:39 ovpn-client1[13752]: Validating certificate extended key usage Apr 17 23:01:39 ovpn-client1[13752]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 23:01:39 ovpn-client1[13752]: VERIFY EKU OK Apr 17 23:01:39 ovpn-client1[13752]: VERIFY OK: depth=0, CN=ch297.nordvpn.com Apr 17 23:01:39 ovpn-client1[13752]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 23:01:39 ovpn-client1[13752]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 23:01:39 ovpn-client1[13752]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 23:02:47 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 17 23:03:48 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 17 23:05:32 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 23:06:30 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 23:08:10 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=0ms, TCP, ) Apr 17 23:08:43 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 17 23:09:25 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 23:10:06 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=19ms, TCP, TLS13) Apr 17 23:13:13 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 23:16:29 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 23:18:13 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=15ms, TCP, TLS13) Apr 17 23:18:54 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=12ms, TCP, TLS13) Apr 17 23:19:47 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=15ms, TCP, TLS13) Apr 17 23:20:37 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=14ms, TCP, TLS13) Apr 17 23:23:13 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 23:25:15 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 23:27:09 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 23:27:48 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 23:29:28 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 23:30:00 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 17 23:31:22 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 17 23:31:54 nextdns[6036]: Connected 116.204.183.61:443 (con=2ms tls=21ms, TCP, TLS13) Apr 17 23:35:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 23:36:54 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 17 23:37:58 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=9ms, TCP, TLS13) Apr 17 23:39:31 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=8ms, TCP, TLS13) Apr 17 23:40:16 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 23:41:44 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=13ms, TCP, TLS13) Apr 17 23:43:24 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 17 23:44:24 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 17 23:46:13 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 23:48:54 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 17 23:50:03 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 17 23:51:13 nextdns[6036]: Connected 116.204.183.61:443 (con=30ms tls=0ms, TCP, ) Apr 17 23:51:47 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 17 23:52:29 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 17 23:53:27 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=10ms, TCP, TLS13) Apr 17 23:53:57 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=10ms, TCP, TLS13) Apr 17 23:57:12 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 23:57:48 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 17 23:58:58 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=12ms, TCP, TLS13) Apr 17 23:59:01 vpnmgr: Retrieving recommended VPN server using NordVPN API with below parameters Apr 17 23:59:01 vpnmgr: Protocol: UDP - Type: Standard - Country: Switzerland - City: Zurich Apr 17 23:59:13 vpnmgr: Updating VPN client 1 to NordVPN server Apr 17 23:59:13 rc_service: service 7787:notify_rc restart_vpnclient1 Apr 17 23:59:13 custom_script: Running /jffs/scripts/service-event (args: restart vpnclient1) Apr 17 23:59:13 vpnmgr: VPN client 1 updated successfully (CH333 Standard UDP) Apr 17 23:59:13 ovpn-client1[13752]: event_wait : Interrupted system call (code=4) Apr 17 23:59:13 ovpn-client1[13752]: SIGTERM received, sending exit notification to peer Apr 17 23:59:15 ovpn-client1[13752]: ovpn-route-pre-down tun11 1500 1584 10.8.2.8 255.255.255.0 init Apr 17 23:59:15 ovpn-client1[13752]: Closing TUN/TAP interface Apr 17 23:59:15 ovpn-client1[13752]: /usr/sbin/ip addr del dev tun11 10.8.2.8/24 Apr 17 23:59:15 lldpd[2080]: removal request for address of 10.8.2.8%107, but no knowledge of it Apr 17 23:59:15 ovpn-client1[13752]: ovpn-down 1 client tun11 1500 1584 10.8.2.8 255.255.255.0 init Apr 17 23:59:15 openvpn-routing: Configured killswitch on VPN client 1 Apr 17 23:59:15 dnsmasq[11800]: read /etc/hosts - 6 addresses Apr 17 23:59:15 ovpn-client1[13752]: SIGTERM[soft,exit-with-notification] received, process exiting Apr 17 23:59:15 openvpn-routing: Clearing routing table for VPN client 1 Apr 17 23:59:15 ovpn-client1[7917]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. Apr 17 23:59:15 ovpn-client1[7917]: OpenVPN 2.5.5 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 2 2022 Apr 17 23:59:15 ovpn-client1[7917]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.08 Apr 17 23:59:15 ovpn-client1[7918]: WARNING: --ping should normally be used with --ping-restart or --ping-exit Apr 17 23:59:15 ovpn-client1[7918]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Apr 17 23:59:15 ovpn-client1[7918]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 23:59:15 ovpn-client1[7918]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Apr 17 23:59:15 ovpn-client1[7918]: TCP/UDP: Preserving recently used remote address: [AF_INET]195.216.219.155:1194 Apr 17 23:59:15 ovpn-client1[7918]: Socket Buffers: R=[524288->1048576] S=[524288->1048576] Apr 17 23:59:15 ovpn-client1[7918]: UDP link local: (not bound) Apr 17 23:59:15 ovpn-client1[7918]: UDP link remote: [AF_INET]195.216.219.155:1194 Apr 17 23:59:15 ovpn-client1[7918]: TLS: Initial packet from [AF_INET]195.216.219.155:1194, sid=22940a5f f9f019c0 Apr 17 23:59:16 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 17 23:59:16 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 17 23:59:16 ovpn-client1[7918]: VERIFY KU OK Apr 17 23:59:16 ovpn-client1[7918]: Validating certificate extended key usage Apr 17 23:59:16 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 17 23:59:16 ovpn-client1[7918]: VERIFY EKU OK Apr 17 23:59:16 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 17 23:59:16 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 17 23:59:16 ovpn-client1[7918]: [ch333.nordvpn.com] Peer Connection Initiated with [AF_INET]195.216.219.155:1194 Apr 17 23:59:17 ovpn-client1[7918]: SENT CONTROL [ch333.nordvpn.com]: 'PUSH_REQUEST' (status=1) Apr 17 23:59:17 ovpn-client1[7918]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.9 255.255.255.0,peer-id 7,cipher AES-256-GCM' Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: timers and/or timeouts modified Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: explicit notify parm(s) modified Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: compression parms modified Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Apr 17 23:59:17 ovpn-client1[7918]: Socket Buffers: R=[1048576->1048576] S=[1048576->1048576] Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: --ifconfig/up options modified Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: route options modified Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: route-related options modified Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: peer-id set Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: adjusting link_mtu to 1656 Apr 17 23:59:17 ovpn-client1[7918]: OPTIONS IMPORT: data channel crypto options modified Apr 17 23:59:17 ovpn-client1[7918]: Data Channel: using negotiated cipher 'AES-256-GCM' Apr 17 23:59:17 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 23:59:17 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 17 23:59:17 ovpn-client1[7918]: TUN/TAP device tun11 opened Apr 17 23:59:17 ovpn-client1[7918]: TUN/TAP TX queue length set to 1000 Apr 17 23:59:17 ovpn-client1[7918]: /usr/sbin/ip link set dev tun11 up mtu 1500 Apr 17 23:59:17 ovpn-client1[7918]: /usr/sbin/ip link set dev tun11 up Apr 17 23:59:17 ovpn-client1[7918]: /usr/sbin/ip addr add dev tun11 10.8.0.9/24 Apr 17 23:59:17 ovpn-client1[7918]: ovpn-up 1 client tun11 1500 1584 10.8.0.9 255.255.255.0 init Apr 17 23:59:17 openvpn-routing: Setting client 1 routing table's default route through the tunnel Apr 17 23:59:17 openvpn-routing: Routing AppleTV from 192.168.1.34 to any through ovpnc1 Apr 17 23:59:17 openvpn: Forcing 192.168.1.34 to use DNS server 103.86.96.100 Apr 17 23:59:18 dnsmasq[11800]: read /etc/hosts - 6 addresses Apr 17 23:59:20 ovpn-client1[7918]: Initialization Sequence Completed Apr 17 23:59:31 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 00:00:01 vpnmgr: Refreshing NordVPN country data... Apr 18 00:00:11 vpnmgr: No changes in NordVPN country data Apr 18 00:00:11 vpnmgr: Refreshing OpenVPN file archives... Apr 18 00:00:32 vpnmgr: No changes in PIA OpenVPN file archives Apr 18 00:00:43 vpnmgr: No changes in WeVPN OpenVPN file archives Apr 18 00:01:04 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 00:01:51 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=11ms, TCP, TLS13) Apr 18 00:02:36 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 00:03:21 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 00:05:30 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 00:07:13 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=13ms, TCP, TLS13) Apr 18 00:09:07 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 00:10:23 nextdns[6036]: Connected 43.229.79.19:443 (con=11ms tls=0ms, TCP, ) Apr 18 00:10:54 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=18ms, TCP, TLS13) Apr 18 00:11:56 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=15ms, TCP, TLS13) Apr 18 00:12:43 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=0ms, TCP, ) Apr 18 00:14:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 00:17:43 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 00:20:31 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 00:21:03 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 18 00:22:43 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 00:23:48 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 00:27:10 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=18ms, TCP, TLS13) Apr 18 00:29:17 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 00:31:39 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 18 00:35:31 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 18 00:37:35 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=13ms, TCP, TLS13) Apr 18 00:38:24 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=0ms, TCP, ) Apr 18 00:39:14 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 00:39:48 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 00:42:14 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 00:43:14 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=14ms, TCP, TLS13) Apr 18 00:44:44 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=11ms, TCP, TLS13) Apr 18 00:45:41 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=12ms, TCP, TLS13) Apr 18 00:47:59 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=8ms, TCP, TLS13) Apr 18 00:50:33 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 00:52:32 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 00:53:05 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=18ms, TCP, TLS13) Apr 18 00:54:03 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 00:54:37 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 00:55:14 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 00:59:16 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 00:59:16 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 00:59:16 ovpn-client1[7918]: VERIFY KU OK Apr 18 00:59:16 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 00:59:16 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 00:59:16 ovpn-client1[7918]: VERIFY EKU OK Apr 18 00:59:16 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 00:59:17 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 00:59:17 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 00:59:17 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 00:59:28 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 01:00:11 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 01:00:53 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 01:03:16 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 01:05:34 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 01:06:14 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 01:06:47 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 01:07:36 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 01:08:18 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=0ms, TCP, ) Apr 18 01:10:25 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 01:11:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 01:11:47 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 01:12:43 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 01:13:44 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=14ms, TCP, TLS13) Apr 18 01:15:14 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=12ms, TCP, TLS13) Apr 18 01:16:26 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 01:18:19 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=14ms, TCP, TLS13) Apr 18 01:19:27 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=0ms, TCP, ) Apr 18 01:20:36 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=14ms, TCP, TLS13) Apr 18 01:23:23 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=10ms, TCP, TLS13) Apr 18 01:27:11 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 18 01:27:47 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 01:29:16 nextdns[6036]: Connected 43.229.79.19:443 (con=11ms tls=16ms, TCP, TLS13) Apr 18 01:30:02 nextdns[6036]: Connected 43.229.79.19:443 (con=18ms tls=14ms, TCP, TLS13) Apr 18 01:34:28 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 01:35:39 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 01:38:12 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=15ms, TCP, TLS13) Apr 18 01:38:44 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 01:40:37 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 01:41:25 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=0ms, TCP, ) Apr 18 01:43:12 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=15ms, TCP, TLS13) Apr 18 01:46:28 nextdns[6036]: Connected 43.229.79.19:443 (con=28ms tls=11ms, TCP, TLS13) Apr 18 01:48:13 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 01:50:42 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 01:52:56 nextdns[6036]: Connected 116.204.183.61:443 (con=23ms tls=20ms, TCP, TLS13) Apr 18 01:54:07 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 18 01:55:42 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 01:59:13 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=12ms, TCP, TLS13) Apr 18 01:59:16 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 01:59:17 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 01:59:17 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 01:59:17 ovpn-client1[7918]: VERIFY KU OK Apr 18 01:59:17 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 01:59:17 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 01:59:17 ovpn-client1[7918]: VERIFY EKU OK Apr 18 01:59:17 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 01:59:18 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 01:59:18 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 01:59:18 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 01:59:46 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 02:00:58 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=0ms, TCP, ) Apr 18 02:01:52 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=0ms, TCP, ) Apr 18 02:02:58 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=11ms, TCP, TLS13) Apr 18 02:03:55 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 02:05:28 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 02:06:17 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 02:07:36 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 02:08:11 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 02:09:07 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=14ms, TCP, TLS13) Apr 18 02:10:35 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 02:11:52 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 02:12:36 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 02:13:33 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=8ms, TCP, TLS13) Apr 18 02:14:04 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=0ms, TCP, ) Apr 18 02:15:13 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 02:15:48 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 02:16:48 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 02:20:25 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 02:23:25 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=0ms, TCP, ) Apr 18 02:24:31 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 02:26:41 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 02:27:12 nextdns[6036]: Connected 116.204.183.61:443 (con=12ms tls=0ms, TCP, ) Apr 18 02:29:09 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=10ms, TCP, TLS13) Apr 18 02:31:05 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 02:31:48 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=15ms, TCP, TLS13) Apr 18 02:33:29 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 02:34:15 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 02:35:25 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 02:38:09 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 02:39:15 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 02:44:27 nextdns[6036]: Connected 43.229.79.19:443 (con=45ms tls=13ms, TCP, TLS13) Apr 18 02:45:09 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 02:45:44 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=0ms, TCP, ) Apr 18 02:46:53 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=10ms, TCP, TLS13) Apr 18 02:47:47 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 02:49:19 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 02:50:29 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=11ms, TCP, TLS13) Apr 18 02:52:44 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=9ms, TCP, TLS13) Apr 18 02:54:19 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 18 02:55:50 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=8ms, TCP, TLS13) Apr 18 02:57:23 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 02:59:00 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 02:59:17 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 02:59:18 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 02:59:18 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 02:59:18 ovpn-client1[7918]: VERIFY KU OK Apr 18 02:59:18 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 02:59:18 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 02:59:18 ovpn-client1[7918]: VERIFY EKU OK Apr 18 02:59:18 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 02:59:19 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 02:59:19 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 02:59:19 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 03:02:14 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 03:03:01 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 03:03:48 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 03:04:39 nextdns[6036]: Connected 43.229.79.19:443 (con=9ms tls=11ms, TCP, TLS13) Apr 18 03:05:30 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=11ms, TCP, TLS13) Apr 18 03:09:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 03:10:11 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 03:14:10 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 03:15:59 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=11ms, TCP, TLS13) Apr 18 03:17:36 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 03:18:33 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 03:19:11 nextdns[6036]: Connected 116.204.183.61:443 (con=32ms tls=9ms, TCP, TLS13) Apr 18 03:19:48 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 03:20:32 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 03:22:24 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 03:23:27 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 03:27:12 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 03:29:19 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=13ms, TCP, TLS13) Apr 18 03:30:02 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 03:32:59 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=13ms, TCP, TLS13) Apr 18 03:34:57 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 03:38:21 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=8ms, TCP, TLS13) Apr 18 03:39:18 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 03:43:38 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 03:45:08 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 03:45:59 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=12ms, TCP, TLS13) Apr 18 03:47:14 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=0ms, TCP, ) Apr 18 03:48:07 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 03:48:54 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 03:50:14 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 03:51:14 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=11ms, TCP, TLS13) Apr 18 03:53:06 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=15ms, TCP, TLS13) Apr 18 03:57:14 nextdns[6036]: Connected 116.204.183.61:443 (con=14ms tls=14ms, TCP, TLS13) Apr 18 03:57:47 nextdns[6036]: Connected 116.204.183.61:443 (con=15ms tls=10ms, TCP, TLS13) Apr 18 03:58:24 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 03:59:17 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 18 03:59:17 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.30 06:7a:56:5e:6b:8d Apr 18 03:59:19 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 03:59:20 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 03:59:20 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 03:59:20 ovpn-client1[7918]: VERIFY KU OK Apr 18 03:59:20 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 03:59:20 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 03:59:20 ovpn-client1[7918]: VERIFY EKU OK Apr 18 03:59:20 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 03:59:20 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 03:59:20 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 03:59:20 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 04:00:00 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 04:01:55 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 04:03:22 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=15ms, TCP, TLS13) Apr 18 04:05:29 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 04:06:23 nextdns[6036]: Connected 116.204.183.61:443 (con=17ms tls=9ms, TCP, TLS13) Apr 18 04:10:16 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=14ms, TCP, TLS13) Apr 18 04:11:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 04:11:57 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 04:14:11 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 04:15:46 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 04:17:43 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 18 04:18:28 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=19ms, TCP, TLS13) Apr 18 04:19:26 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=13ms, TCP, TLS13) Apr 18 04:20:30 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=13ms, TCP, TLS13) Apr 18 04:21:33 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 04:22:36 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 04:23:29 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=9ms, TCP, TLS13) Apr 18 04:25:43 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 18 04:27:14 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 04:30:44 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 04:31:23 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 04:32:56 nextdns[6036]: Connected 116.204.183.61:443 (con=30ms tls=11ms, TCP, TLS13) Apr 18 04:35:31 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=10ms, TCP, TLS13) Apr 18 04:38:51 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 04:39:48 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=14ms, TCP, TLS13) Apr 18 04:44:33 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 04:45:43 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=13ms, TCP, TLS13) Apr 18 04:46:19 nextdns[6036]: Connected 43.229.79.19:443 (con=9ms tls=12ms, TCP, TLS13) Apr 18 04:47:15 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=16ms, TCP, TLS13) Apr 18 04:48:56 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 04:50:31 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 04:54:14 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=13ms, TCP, TLS13) Apr 18 04:55:47 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=8ms, TCP, TLS13) Apr 18 04:56:20 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 04:57:06 nextdns[6036]: Connected 43.229.79.19:443 (con=11ms tls=12ms, TCP, TLS13) Apr 18 04:58:33 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=12ms, TCP, TLS13) Apr 18 04:59:19 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 04:59:20 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 04:59:20 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 04:59:20 ovpn-client1[7918]: VERIFY KU OK Apr 18 04:59:20 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 04:59:20 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 04:59:20 ovpn-client1[7918]: VERIFY EKU OK Apr 18 04:59:20 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 04:59:21 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 04:59:21 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 04:59:21 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 04:59:21 nextdns[6036]: Connected 116.204.183.61:443 (con=11ms tls=16ms, TCP, TLS13) Apr 18 05:01:04 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 05:04:12 nextdns[6036]: Connected 43.229.79.19:443 (con=9ms tls=0ms, TCP, ) Apr 18 05:04:56 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=14ms, TCP, TLS13) Apr 18 05:05:32 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 18 05:06:59 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 05:08:15 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 05:08:57 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 05:09:29 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=15ms, TCP, TLS13) Apr 18 05:10:31 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 18 05:11:48 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=11ms, TCP, TLS13) Apr 18 05:12:30 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 05:15:02 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=14ms, TCP, TLS13) Apr 18 05:16:13 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=14ms, TCP, TLS13) Apr 18 05:16:44 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=20ms, TCP, TLS13) Apr 18 05:19:21 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 05:20:02 nextdns[6036]: Connected 43.229.79.19:443 (con=9ms tls=0ms, TCP, ) Apr 18 05:20:36 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 05:23:02 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 05:26:55 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 05:29:56 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 05:31:17 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 05:32:33 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 05:33:35 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 05:35:36 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 05:37:07 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=11ms, TCP, TLS13) Apr 18 05:38:41 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 05:40:33 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 18 05:42:07 nextdns[6036]: Connected 43.229.79.19:443 (con=18ms tls=12ms, TCP, TLS13) Apr 18 05:45:02 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=15ms, TCP, TLS13) Apr 18 05:46:13 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=10ms, TCP, TLS13) Apr 18 05:46:47 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 05:48:14 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 05:50:37 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 05:51:43 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 05:53:24 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 05:54:15 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 18 05:55:27 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 05:56:53 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 05:58:59 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 05:59:20 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 05:59:21 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 05:59:21 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 05:59:21 ovpn-client1[7918]: VERIFY KU OK Apr 18 05:59:21 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 05:59:21 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 05:59:21 ovpn-client1[7918]: VERIFY EKU OK Apr 18 05:59:21 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 05:59:22 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 05:59:22 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 05:59:22 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 05:59:38 nextdns[6036]: Connected 43.229.79.19:443 (con=18ms tls=13ms, TCP, TLS13) Apr 18 06:03:16 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 06:05:30 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 06:09:43 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=14ms, TCP, TLS13) Apr 18 06:13:25 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 06:14:52 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 06:16:10 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 06:19:44 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 06:21:56 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 06:22:54 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=13ms, TCP, TLS13) Apr 18 06:24:25 nextdns[6036]: Connected 43.229.79.19:443 (con=10ms tls=12ms, TCP, TLS13) Apr 18 06:25:27 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 06:27:15 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 06:28:09 nextdns[6036]: Connected 43.229.79.19:443 (con=15ms tls=15ms, TCP, TLS13) Apr 18 06:28:54 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 06:29:38 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 06:30:15 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=13ms, TCP, TLS13) Apr 18 06:32:36 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=10ms, TCP, TLS13) Apr 18 06:34:14 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 06:35:01 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=11ms, TCP, TLS13) Apr 18 06:36:46 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 06:37:47 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 06:40:31 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 18 06:40:31 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 06:42:41 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 06:43:31 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 06:47:49 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=12ms, TCP, TLS13) Apr 18 06:50:33 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 06:51:34 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 06:53:57 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=12ms, TCP, TLS13) Apr 18 06:55:24 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 06:56:07 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 06:58:26 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 06:59:21 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 06:59:22 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 06:59:22 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 06:59:22 ovpn-client1[7918]: VERIFY KU OK Apr 18 06:59:22 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 06:59:22 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 06:59:22 ovpn-client1[7918]: VERIFY EKU OK Apr 18 06:59:22 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 06:59:23 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 06:59:23 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 06:59:23 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 07:00:20 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 07:01:07 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 07:05:33 nextdns[6036]: Connected 116.204.183.61:443 (con=5ms tls=11ms, TCP, TLS13) Apr 18 07:07:35 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 07:09:18 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=14ms, TCP, TLS13) Apr 18 07:09:58 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=8ms, TCP, TLS13) Apr 18 07:11:31 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=0ms, TCP, ) Apr 18 07:20:34 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 07:20:35 nextdns[6036]: Connected 43.229.79.19:443 (con=1ms tls=432ms, TCP, TLS13) Apr 18 07:20:35 nextdns[6036]: Switching endpoint: https://dns.nextdns.io#116.204.183.61,43.229.79.19 Apr 18 07:21:57 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 07:23:34 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 07:25:16 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 07:25:58 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 07:27:26 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Apr 18 07:27:26 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.160 58:d3:49:2d:4d:a7 Office Apr 18 07:28:03 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=10ms, TCP, TLS13) Apr 18 07:31:08 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 07:35:29 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=11ms, TCP, TLS13) Apr 18 07:37:36 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=8ms, TCP, TLS13) Apr 18 07:38:33 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=11ms, TCP, TLS13) Apr 18 07:39:34 nextdns[6036]: Connected 43.229.79.19:443 (con=10ms tls=10ms, TCP, TLS13) Apr 18 07:40:22 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 07:41:58 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 07:45:15 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=0ms, TCP, ) Apr 18 07:46:09 nextdns[6036]: Connected 43.229.79.19:443 (con=1ms tls=9ms, TCP, TLS13) Apr 18 07:47:42 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 07:50:36 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=0ms, TCP, ) Apr 18 07:52:04 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=11ms, TCP, TLS13) Apr 18 07:53:29 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=14ms, TCP, TLS13) Apr 18 07:55:34 nextdns[6036]: Connected 43.229.79.19:443 (con=24ms tls=21ms, TCP, TLS13) Apr 18 07:56:25 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 07:57:57 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 07:59:22 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 07:59:23 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 07:59:23 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 07:59:23 ovpn-client1[7918]: VERIFY KU OK Apr 18 07:59:23 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 07:59:23 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 07:59:23 ovpn-client1[7918]: VERIFY EKU OK Apr 18 07:59:23 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 07:59:24 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 07:59:24 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 07:59:24 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 08:01:05 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 08:01:55 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=17ms, TCP, TLS13) Apr 18 08:03:20 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=11ms, TCP, TLS13) Apr 18 08:05:30 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 08:06:50 nextdns[6036]: Connected 116.204.183.61:443 (con=26ms tls=14ms, TCP, TLS13) Apr 18 08:07:38 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 08:08:23 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 08:09:00 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Apr 18 08:09:00 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.34 d0:d2:b0:97:65:d9 Wohnzimmer Apr 18 08:11:34 nextdns[6036]: Connected 43.229.79.19:443 (con=26ms tls=10ms, TCP, TLS13) Apr 18 08:12:48 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=0ms, TCP, ) Apr 18 08:13:58 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 08:15:34 nextdns[6036]: Connected 43.229.79.19:443 (con=21ms tls=24ms, TCP, TLS13) Apr 18 08:19:50 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=15ms, TCP, TLS13) Apr 18 08:20:30 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=0ms, TCP, ) Apr 18 08:27:34 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=11ms, TCP, TLS13) Apr 18 08:29:58 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 08:31:13 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 08:35:30 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 08:36:05 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.172 58:d3:49:30:0f:e2 Apr 18 08:36:05 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.172 58:d3:49:30:0f:e2 Bedroom Apr 18 08:42:09 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 08:43:33 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 08:45:58 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 08:47:05 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 08:50:32 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 08:51:10 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 08:51:10 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 08:51:10 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 08:51:10 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 08:51:11 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=11ms, TCP, TLS13) Apr 18 08:52:22 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 18 08:53:07 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 08:54:21 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 08:56:59 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 08:58:05 nextdns[6036]: Connected 116.204.183.61:443 (con=9ms tls=14ms, TCP, TLS13) Apr 18 08:59:12 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 08:59:23 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 08:59:24 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 08:59:24 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 08:59:24 ovpn-client1[7918]: VERIFY KU OK Apr 18 08:59:24 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 08:59:24 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 08:59:24 ovpn-client1[7918]: VERIFY EKU OK Apr 18 08:59:24 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 08:59:25 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 08:59:25 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 08:59:25 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 09:00:16 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 09:01:06 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=0ms, TCP, ) Apr 18 09:02:08 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=20ms, TCP, TLS13) Apr 18 09:04:54 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=20ms, TCP, TLS13) Apr 18 09:07:00 nextdns[6036]: Connected 116.204.183.61:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 09:07:43 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 09:08:32 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 09:09:31 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 09:10:57 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 09:11:46 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 09:16:17 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 09:17:01 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 09:18:40 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 09:20:09 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 09:22:27 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=10ms, TCP, TLS13) Apr 18 09:24:15 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 09:25:03 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 09:26:25 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 09:28:37 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 09:29:21 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 09:31:36 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 09:32:54 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=neighborshavingsex.com Apr 18 09:32:54 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=neighborshavingsex.com Apr 18 09:32:54 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=neighborshavingsex.com Apr 18 09:32:54 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=neighborshavingsex.com Apr 18 09:32:54 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=neighborshavingsex.com Apr 18 09:32:54 kernel: *** ERROR: [send_redir_page:614] # redir_url=http://192.168.1.1:80/blocking.asp?cat_id=3&mac=36CDDC2B52B9&domain=neighborshavingsex.com Apr 18 09:33:30 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=14ms, TCP, TLS13) Apr 18 09:38:29 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 09:39:35 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 09:41:05 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 09:42:12 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 09:42:45 nextdns[6036]: Connected 116.204.183.61:443 (con=11ms tls=13ms, TCP, TLS13) Apr 18 09:44:20 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 09:47:18 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 09:50:38 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 09:52:48 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 09:53:39 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=14ms, TCP, TLS13) Apr 18 09:55:26 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 09:56:02 wlceventd: wlceventd_proc_event(527): eth6: Auth 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 18 09:56:02 wlceventd: wlceventd_proc_event(556): eth6: Assoc 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 18 09:56:04 dnsmasq-dhcp[11800]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 18 09:56:04 dnsmasq-dhcp[11800]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:05 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:05 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:56:24 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:24 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:56:27 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:27 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:56:29 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 3C:A6:F6:6C:B1:C8, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 09:56:29 wlceventd: wlceventd_proc_event(527): eth6: Auth 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 18 09:56:29 wlceventd: wlceventd_proc_event(556): eth6: Assoc 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 18 09:56:30 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:30 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:56:32 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:32 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:56:34 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:34 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:56:39 dnsmasq-dhcp[11800]: DHCPDISCOVER(br0) 3c:a6:f6:6c:b1:c8 Apr 18 09:56:39 dnsmasq-dhcp[11800]: DHCPOFFER(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:40 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:56:40 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:57:22 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 3C:A6:F6:6C:B1:C8, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 09:57:23 wlceventd: wlceventd_proc_event(527): eth6: Auth 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 18 09:57:23 wlceventd: wlceventd_proc_event(556): eth6: Assoc 3C:A6:F6:6C:B1:C8, status: Successful (0), rssi:0 Apr 18 09:57:24 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 Apr 18 09:57:24 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.21 3c:a6:f6:6c:b1:c8 iMac Apr 18 09:59:24 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 09:59:25 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 09:59:25 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 09:59:25 ovpn-client1[7918]: VERIFY KU OK Apr 18 09:59:25 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 09:59:25 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 09:59:25 ovpn-client1[7918]: VERIFY EKU OK Apr 18 09:59:25 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 09:59:26 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 09:59:26 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 09:59:26 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 10:05:16 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 10:08:16 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=8ms, TCP, TLS13) Apr 18 10:09:01 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 10:10:22 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 10:11:57 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 10:14:18 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 10:15:44 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 10:16:33 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 10:18:22 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 10:19:01 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 10:19:47 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 10:20:39 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 18 10:24:58 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 10:29:31 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 18 10:29:31 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 10:32:38 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 10:34:26 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 10:35:40 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 10:37:11 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 18 10:37:48 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=13ms, TCP, TLS13) Apr 18 10:40:16 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 10:40:56 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 10:43:25 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=0ms, TCP, ) Apr 18 10:44:18 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 10:45:19 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 10:48:41 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 10:49:41 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=9ms, TCP, TLS13) Apr 18 10:50:43 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=0ms, TCP, ) Apr 18 10:51:21 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=23ms, TCP, TLS13) Apr 18 10:52:36 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=14ms, TCP, TLS13) Apr 18 10:54:40 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 10:59:19 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 10:59:25 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 10:59:27 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 10:59:27 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 10:59:27 ovpn-client1[7918]: VERIFY KU OK Apr 18 10:59:27 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 10:59:27 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 10:59:27 ovpn-client1[7918]: VERIFY EKU OK Apr 18 10:59:27 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 10:59:27 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 10:59:27 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 10:59:27 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 11:00:35 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=15ms, TCP, TLS13) Apr 18 11:02:08 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 11:04:14 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 11:05:46 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 11:06:30 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 11:08:41 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 11:10:18 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=11ms, TCP, TLS13) Apr 18 11:12:37 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 11:14:51 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 11:15:45 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 11:17:08 nextdns[6036]: Connected 116.204.183.61:443 (con=10ms tls=14ms, TCP, TLS13) Apr 18 11:17:48 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=8ms, TCP, TLS13) Apr 18 11:19:08 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 11:20:50 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=10ms, TCP, TLS13) Apr 18 11:20:51 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=473ms, TCP, TLS13) Apr 18 11:20:51 nextdns[6036]: Switching endpoint: https://dns.nextdns.io#43.229.79.19,116.204.183.61 Apr 18 11:21:47 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 11:22:48 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 11:24:14 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 11:25:19 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 11:26:40 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=13ms, TCP, TLS13) Apr 18 11:31:31 nextdns[6036]: Connected 116.204.183.61:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 11:33:02 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=13ms, TCP, TLS13) Apr 18 11:35:39 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=0ms, TCP, ) Apr 18 11:37:37 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 18 11:40:38 nextdns[6036]: Connected 116.204.183.61:443 (con=12ms tls=16ms, TCP, TLS13) Apr 18 11:41:44 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 11:42:40 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 11:44:21 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=10ms, TCP, TLS13) Apr 18 11:45:16 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=9ms, TCP, TLS13) Apr 18 11:45:55 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 11:47:54 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 11:50:51 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 11:52:22 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 11:53:26 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 11:54:26 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 11:57:36 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 11:58:33 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=12ms, TCP, TLS13) Apr 18 11:59:26 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 11:59:28 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 11:59:28 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 11:59:28 ovpn-client1[7918]: VERIFY KU OK Apr 18 11:59:28 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 11:59:28 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 11:59:28 ovpn-client1[7918]: VERIFY EKU OK Apr 18 11:59:28 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 11:59:29 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 11:59:29 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 11:59:29 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 12:00:38 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=9ms, TCP, TLS13) Apr 18 12:01:09 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=14ms, TCP, TLS13) Apr 18 12:02:19 watchdog: Forced DDNS update (after 1 days) Apr 18 12:02:19 rc_service: watchdog 1266:notify_rc restart_ddns Apr 18 12:02:19 custom_script: Running /jffs/scripts/service-event (args: restart ddns) Apr 18 12:02:19 start_ddns: IP address, server and hostname have not changed since the last update. Apr 18 12:03:24 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=0ms, TCP, ) Apr 18 12:04:59 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=11ms, TCP, TLS13) Apr 18 12:06:30 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 12:06:30 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 12:06:30 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 12:06:30 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 12:06:30 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:06:30 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:06:30 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 18 12:06:30 dnsmasq-dhcp[11800]: DHCPDISCOVER(br0) 2e:65:bf:c6:a3:df Apr 18 12:06:30 dnsmasq-dhcp[11800]: DHCPOFFER(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:06:31 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:06:31 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:06:34 wlceventd: wlceventd_proc_event(527): eth5: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:06:34 wlceventd: wlceventd_proc_event(537): eth5: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:06:34 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 12:06:34 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 12:06:34 kernel: br0: received packet on eth5 with own address as source address Apr 18 12:06:34 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:06:34 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:07:12 wlceventd: wlceventd_proc_event(491): eth5: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Deauthenticated because sending station is leaving (or has left) IBSS or ESS (3), rssi:-56 Apr 18 12:07:12 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:07:12 wlceventd: wlceventd_proc_event(537): eth6: ReAssoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:07:12 wlceventd: wlceventd_proc_event(508): eth5: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 12:07:12 kernel: br0: received packet on eth6 with own address as source address Apr 18 12:07:12 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:07:12 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:08:19 nextdns[6036]: Connected 43.229.79.19:443 (con=9ms tls=11ms, TCP, TLS13) Apr 18 12:09:32 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 12:09:32 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 2E:65:BF:C6:A3:DF, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 12:14:25 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 12:15:46 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=12ms, TCP, TLS13) Apr 18 12:17:07 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=11ms, TCP, TLS13) Apr 18 12:20:37 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 12:23:13 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 12:23:45 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 12:25:00 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 12:27:01 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=25ms, TCP, TLS13) Apr 18 12:27:30 wlceventd: wlceventd_proc_event(491): eth6: Deauth_ind 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated due to inactivity (4), rssi:0 Apr 18 12:27:30 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 12:28:41 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 12:28:49 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 12:28:49 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 12:28:49 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 12:28:49 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 12:28:52 wlceventd: wlceventd_proc_event(527): eth6: Auth 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:28:52 wlceventd: wlceventd_proc_event(556): eth6: Assoc 2E:65:BF:C6:A3:DF, status: Successful (0), rssi:0 Apr 18 12:28:52 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:28:52 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.31 2e:65:bf:c6:a3:df Apr 18 12:30:41 nextdns[6036]: Connected 43.229.79.19:443 (con=0ms tls=0ms, TCP, ) Apr 18 12:32:56 nextdns[6036]: Connected 43.229.79.19:443 (con=26ms tls=13ms, TCP, TLS13) Apr 18 12:33:58 nextdns[6036]: Connected 43.229.79.19:443 (con=8ms tls=11ms, TCP, TLS13) Apr 18 12:34:05 nextdns[6036]: Query 192.168.1.30 UDP A abs.twimg.com. (qry=64/res=12) cache fallback HTTP/2.0: doh resolve: context deadline exceeded Apr 18 12:34:05 nextdns[6036]: Query 192.168.1.30 UDP 65 abs.twimg.com. (qry=64/res=12) cache fallback HTTP/2.0: doh resolve: context deadline exceeded Apr 18 12:34:07 nextdns[6036]: Query 192.168.1.30 UDP A abs.twimg.com. (qry=64/res=12) cache fallback HTTP/2.0: doh resolve: context deadline exceeded Apr 18 12:34:08 nextdns[6036]: Query 192.168.1.30 UDP A ocsp.digicert.com. (qry=68/res=12) cache fallback HTTP/2.0: doh resolve: context deadline exceeded Apr 18 12:34:08 nextdns[6036]: Query 192.168.1.30 UDP 65 ocsp.digicert.com. (qry=68/res=12) cache fallback HTTP/2.0: doh resolve: context deadline exceeded Apr 18 12:35:15 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 12:36:52 nextdns[6036]: Connected 116.204.183.61:443 (con=6ms tls=14ms, TCP, TLS13) Apr 18 12:37:28 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 12:38:09 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=9ms, TCP, TLS13) Apr 18 12:39:27 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=8ms, TCP, TLS13) Apr 18 12:40:49 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 12:41:30 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 12:43:08 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 12:44:15 nextdns[6036]: Connected 116.204.183.61:443 (con=8ms tls=12ms, TCP, TLS13) Apr 18 12:45:14 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 12:47:30 nextdns[6036]: Connected 43.229.79.19:443 (con=1ms tls=10ms, TCP, TLS13) Apr 18 12:48:58 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=8ms, TCP, TLS13) Apr 18 12:51:10 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=11ms, TCP, TLS13) Apr 18 12:51:58 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 12:53:20 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=10ms, TCP, TLS13) Apr 18 12:54:29 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=10ms, TCP, TLS13) Apr 18 12:56:15 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=11ms, TCP, TLS13) Apr 18 12:57:20 nextdns[6036]: Connected 116.204.183.61:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 12:59:12 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=17ms, TCP, TLS13) Apr 18 12:59:28 ovpn-client1[7918]: TLS: tls_process: killed expiring key Apr 18 12:59:30 ovpn-client1[7918]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Apr 18 12:59:30 ovpn-client1[7918]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7 Apr 18 12:59:30 ovpn-client1[7918]: VERIFY KU OK Apr 18 12:59:30 ovpn-client1[7918]: Validating certificate extended key usage Apr 18 12:59:30 ovpn-client1[7918]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Apr 18 12:59:30 ovpn-client1[7918]: VERIFY EKU OK Apr 18 12:59:30 ovpn-client1[7918]: VERIFY OK: depth=0, CN=ch333.nordvpn.com Apr 18 12:59:30 ovpn-client1[7918]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 12:59:30 ovpn-client1[7918]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Apr 18 12:59:30 ovpn-client1[7918]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Apr 18 12:59:56 nextdns[6036]: Connected 116.204.183.61:443 (con=0ms tls=0ms, TCP, ) Apr 18 13:00:37 nextdns[6036]: Connected 43.229.79.19:443 (con=6ms tls=9ms, TCP, TLS13) Apr 18 13:01:56 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=10ms, TCP, TLS13) Apr 18 13:02:36 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=0ms, TCP, ) Apr 18 13:03:33 nextdns[6036]: Connected 43.229.79.19:443 (con=4ms tls=0ms, TCP, ) Apr 18 13:04:43 nextdns[6036]: Connected 116.204.183.61:443 (con=4ms tls=12ms, TCP, TLS13) Apr 18 13:09:03 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 13:13:29 nextdns[6036]: Connected 43.229.79.19:443 (con=5ms tls=11ms, TCP, TLS13) Apr 18 13:15:18 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=9ms, TCP, TLS13) Apr 18 13:17:53 nextdns[6036]: Connected 116.204.183.61:443 (con=19ms tls=14ms, TCP, TLS13) Apr 18 13:18:40 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=13ms, TCP, TLS13) Apr 18 13:20:56 nextdns[6036]: Connected 43.229.79.19:443 (con=2ms tls=394ms, TCP, TLS13) Apr 18 13:20:56 nextdns[6036]: Switching endpoint: https://dns.nextdns.io#116.204.183.61,43.229.79.19 Apr 18 13:23:01 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 13:23:51 nextdns[6036]: Connected 43.229.79.19:443 (con=3ms tls=9ms, TCP, TLS13) Apr 18 13:25:25 nextdns[6036]: Connected 43.229.79.19:443 (con=7ms tls=12ms, TCP, TLS13) Apr 18 13:32:54 wlceventd: wlceventd_proc_event(508): eth6: Disassoc 36:CD:DC:2B:52:B9, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0 Apr 18 13:32:55 wlceventd: wlceventd_proc_event(527): eth6: Auth 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 13:32:55 wlceventd: wlceventd_proc_event(556): eth6: Assoc 36:CD:DC:2B:52:B9, status: Successful (0), rssi:0 Apr 18 13:32:55 dnsmasq-dhcp[11800]: DHCPREQUEST(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 13:32:55 dnsmasq-dhcp[11800]: DHCPACK(br0) 192.168.1.126 36:cd:dc:2b:52:b9 Apr 18 13:35:26 kernel: httpd (1246): drop_caches: 1 Apr 18 13:35:30 kernel: httpds (1245): drop_caches: 1