I have the same router and I do not know how to open a topic. My router is built with Openvpn and the authentication failed. I have try many firmwares. Here is the system log :
Jul 13 02:56:58 rc_service: httpd 5269:notify_rc stop_vpnc
Jul 13 02:57:03 rc_service: httpd 5269:notify_rc restart_vpnc
Jul 13 02:57:05 vpnclient5[10002]: WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Jul 13 02:57:05 vpnclient5[10002]: OpenVPN 2.4.12 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 13 2023
Jul 13 02:57:05 vpnclient5[10002]: library versions: OpenSSL 1.1.1t 7 Feb 2023, LZO 2.10
Jul 13 02:57:05 vpnclient5[10003]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jul 13 02:57:05 vpnclient5[10003]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.108.106.200:443
Jul 13 02:57:05 vpnclient5[10003]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Jul 13 02:57:05 vpnclient5[10003]: UDP link local: (not bound)
Jul 13 02:57:05 vpnclient5[10003]: UDP link remote: [AF_INET]185.108.106.200:443
Jul 13 02:57:05 vpnclient5[10003]: TLS: Initial packet from [AF_INET]185.108.106.200:443, sid=16d99a0a fb1daf16
Jul 13 02:57:05 vpnclient5[10003]: VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Jul 13 02:57:05 vpnclient5[10003]: VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 02:57:05 vpnclient5[10003]: VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 02:57:06 vpnclient5[10003]: Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Jul 13 02:57:06 vpnclient5[10003]: [bod-c04.ipvanish.com] Peer Connection Initiated with [AF_INET]185.108.106.200:443
Jul 13 02:57:07 vpnclient5[10003]: SENT CONTROL [bod-c04.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Jul 13 02:57:07 vpnclient5[10003]: AUTH: Received control message: AUTH_FAILED
Jul 13 02:57:07 vpnclient5[10003]: SIGTERM[soft,auth-failure] received, process exiting
Jul 13 01:00:13 disk_monitor: Got SIGALRM...
Jul 13 03:18:08 rc_service: httpd 5269:notify_rc stop_vpnc
Jul 13 03:30:13 wlceventd: wlceventd_proc_event(685): eth5: Auth AC:74:B1:2B:1D:9E, status: Successful (0), rssi:0
Jul 13 03:30:13 wlceventd: wlceventd_proc_event(695): eth5: ReAssoc AC:74:B1:2B:1D:9E, status: Successful (0), rssi:-38
Jul 13 03:30:14 bsd: bsd: Sending act Frame to ac:74:b1:2b:1d:9e with transition target eth6 ssid c8:7f:54:12:22:ac
Jul 13 03:30:14 bsd: bsd: BSS Transit Response: ifname=eth5, event=156, token=2, status=5, mac=00:00:00:00:00:00
Jul 13 03:30:14 bsd: bsd: BSS Transit Response: STA reject
Jul 13 03:30:14 bsd: bsd: Skip STA:ac:74:b1:2b:1d:9e reject BSSID
Jul 13 03:31:35 wlceventd: wlceventd_proc_event(645): eth6: Deauth_ind AC:74:B1:2B:1D:9E, status: 0, reason: Disassociated due to inactivity (4), rssi:-29
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(685): eth6: Auth AC:74:B1:2B:1D:9E, status: Successful (0), rssi:0
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(695): eth6: ReAssoc AC:74:B1:2B:1D:9E, status: Successful (0), rssi:-29
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(662): eth5: Disassoc AC:74:B1:2B:1D:9E, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(662): eth5: Disassoc AC:74:B1:2B:1D:9E, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jul 13 03:39:58 rc_service: httpd 5269:notify_rc restart_vpnc
Jul 13 03:40:03 vpnclient5[16852]: WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Jul 13 03:40:03 vpnclient5[16852]: OpenVPN 2.4.12 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 13 2023
Jul 13 03:40:03 vpnclient5[16852]: library versions: OpenSSL 1.1.1t 7 Feb 2023, LZO 2.10
Jul 13 03:40:03 vpnclient5[16853]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jul 13 03:40:03 vpnclient5[16853]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.108.106.200:443
Jul 13 03:40:03 vpnclient5[16853]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Jul 13 03:40:03 vpnclient5[16853]: UDP link local: (not bound)
Jul 13 03:40:03 vpnclient5[16853]: UDP link remote: [AF_INET]185.108.106.200:443
Jul 13 03:40:03 vpnclient5[16853]: TLS: Initial packet from [AF_INET]185.108.106.200:443, sid=bc15ec11 ce7ae79f
Jul 13 03:40:03 vpnclient5[16853]: VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Jul 13 03:40:03 vpnclient5[16853]: VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 03:40:03 vpnclient5[16853]: VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 03:40:05 vpnclient5[16853]: Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Jul 13 03:40:05 vpnclient5[16853]: [bod-c04.ipvanish.com] Peer Connection Initiated with [AF_INET]185.108.106.200:443
Jul 13 03:40:06 vpnclient5[16853]: SENT CONTROL [bod-c04.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Jul 13 03:40:06 vpnclient5[16853]: AUTH: Received control message: AUTH_FAILED
Jul 13 03:40:06 vpnclient5[16853]: SIGTERM[soft,auth-failure] received, process exiting
Jul 13 02:56:58 rc_service: httpd 5269:notify_rc stop_vpnc
Jul 13 02:57:03 rc_service: httpd 5269:notify_rc restart_vpnc
Jul 13 02:57:05 vpnclient5[10002]: WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Jul 13 02:57:05 vpnclient5[10002]: OpenVPN 2.4.12 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 13 2023
Jul 13 02:57:05 vpnclient5[10002]: library versions: OpenSSL 1.1.1t 7 Feb 2023, LZO 2.10
Jul 13 02:57:05 vpnclient5[10003]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jul 13 02:57:05 vpnclient5[10003]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.108.106.200:443
Jul 13 02:57:05 vpnclient5[10003]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Jul 13 02:57:05 vpnclient5[10003]: UDP link local: (not bound)
Jul 13 02:57:05 vpnclient5[10003]: UDP link remote: [AF_INET]185.108.106.200:443
Jul 13 02:57:05 vpnclient5[10003]: TLS: Initial packet from [AF_INET]185.108.106.200:443, sid=16d99a0a fb1daf16
Jul 13 02:57:05 vpnclient5[10003]: VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Jul 13 02:57:05 vpnclient5[10003]: VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 02:57:05 vpnclient5[10003]: VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 02:57:06 vpnclient5[10003]: Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Jul 13 02:57:06 vpnclient5[10003]: [bod-c04.ipvanish.com] Peer Connection Initiated with [AF_INET]185.108.106.200:443
Jul 13 02:57:07 vpnclient5[10003]: SENT CONTROL [bod-c04.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Jul 13 02:57:07 vpnclient5[10003]: AUTH: Received control message: AUTH_FAILED
Jul 13 02:57:07 vpnclient5[10003]: SIGTERM[soft,auth-failure] received, process exiting
Jul 13 01:00:13 disk_monitor: Got SIGALRM...
Jul 13 03:18:08 rc_service: httpd 5269:notify_rc stop_vpnc
Jul 13 03:30:13 wlceventd: wlceventd_proc_event(685): eth5: Auth AC:74:B1:2B:1D:9E, status: Successful (0), rssi:0
Jul 13 03:30:13 wlceventd: wlceventd_proc_event(695): eth5: ReAssoc AC:74:B1:2B:1D:9E, status: Successful (0), rssi:-38
Jul 13 03:30:14 bsd: bsd: Sending act Frame to ac:74:b1:2b:1d:9e with transition target eth6 ssid c8:7f:54:12:22:ac
Jul 13 03:30:14 bsd: bsd: BSS Transit Response: ifname=eth5, event=156, token=2, status=5, mac=00:00:00:00:00:00
Jul 13 03:30:14 bsd: bsd: BSS Transit Response: STA reject
Jul 13 03:30:14 bsd: bsd: Skip STA:ac:74:b1:2b:1d:9e reject BSSID
Jul 13 03:31:35 wlceventd: wlceventd_proc_event(645): eth6: Deauth_ind AC:74:B1:2B:1D:9E, status: 0, reason: Disassociated due to inactivity (4), rssi:-29
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(685): eth6: Auth AC:74:B1:2B:1D:9E, status: Successful (0), rssi:0
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(695): eth6: ReAssoc AC:74:B1:2B:1D:9E, status: Successful (0), rssi:-29
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(662): eth5: Disassoc AC:74:B1:2B:1D:9E, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jul 13 03:33:16 wlceventd: wlceventd_proc_event(662): eth5: Disassoc AC:74:B1:2B:1D:9E, status: 0, reason: Disassociated because sending station is leaving (or has left) BSS (8), rssi:0
Jul 13 03:39:58 rc_service: httpd 5269:notify_rc restart_vpnc
Jul 13 03:40:03 vpnclient5[16852]: WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Jul 13 03:40:03 vpnclient5[16852]: OpenVPN 2.4.12 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 13 2023
Jul 13 03:40:03 vpnclient5[16852]: library versions: OpenSSL 1.1.1t 7 Feb 2023, LZO 2.10
Jul 13 03:40:03 vpnclient5[16853]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jul 13 03:40:03 vpnclient5[16853]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.108.106.200:443
Jul 13 03:40:03 vpnclient5[16853]: Socket Buffers: R=[524288->524288] S=[524288->524288]
Jul 13 03:40:03 vpnclient5[16853]: UDP link local: (not bound)
Jul 13 03:40:03 vpnclient5[16853]: UDP link remote: [AF_INET]185.108.106.200:443
Jul 13 03:40:03 vpnclient5[16853]: TLS: Initial packet from [AF_INET]185.108.106.200:443, sid=bc15ec11 ce7ae79f
Jul 13 03:40:03 vpnclient5[16853]: VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Jul 13 03:40:03 vpnclient5[16853]: VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 03:40:03 vpnclient5[16853]: VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=bod-c04.ipvanish.com, emailAddress=support@ipvanish.com
Jul 13 03:40:05 vpnclient5[16853]: Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Jul 13 03:40:05 vpnclient5[16853]: [bod-c04.ipvanish.com] Peer Connection Initiated with [AF_INET]185.108.106.200:443
Jul 13 03:40:06 vpnclient5[16853]: SENT CONTROL [bod-c04.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Jul 13 03:40:06 vpnclient5[16853]: AUTH: Received control message: AUTH_FAILED
Jul 13 03:40:06 vpnclient5[16853]: SIGTERM[soft,auth-failure] received, process exiting
Statistics: Posted by knox36 — Sat Jul 13, 2024 1:47 am