In step 8 you create a firewall rule. I think thuis rule is the problem. This rule should be disabled if the wireguard is down or you turn it off. I am also struggling with this
				
			This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menu
Versions 	OPNsense 21.7.3_3-amd64
FreeBSD 12.1-RELEASE-p20-HBSD
OpenSSL 1.1.1l 24 Aug 2021Date
	
Process
	
Line
	
2021-10-24T20:42:04	openvpn[56970]	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256	 
2021-10-24T20:42:04	openvpn[56970]	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T20:42:04	openvpn[56970]	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T20:42:04	openvpn[56970]	WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA512'	 
2021-10-24T20:42:04	openvpn[56970]	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1582', remote='link-mtu 1634'	 
2021-10-24T20:42:04	openvpn[56970]	VERIFY OK: depth=0, CN=node-nl-45.protonvpn.net	 
2021-10-24T20:42:04	openvpn[56970]	VERIFY EKU OK	 
2021-10-24T20:42:04	openvpn[56970]	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication	 
2021-10-24T20:42:04	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T20:42:04	openvpn[56970]	++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T20:42:04	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.7.3.2, expects TLS Web Server Authentication	 
2021-10-24T20:42:04	openvpn[56970]	++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Server Authentication	 
2021-10-24T20:42:04	openvpn[56970]	Validating certificate extended key usage	 
2021-10-24T20:42:04	openvpn[56970]	VERIFY KU OK	 
2021-10-24T20:42:04	openvpn[56970]	VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1	 
2021-10-24T20:42:04	openvpn[56970]	VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA	 
2021-10-24T20:29:29	openvpn[56970]	MANAGEMENT: Client disconnected	 
2021-10-24T20:29:29	openvpn[56970]	MANAGEMENT: CMD 'status 2'	 
2021-10-24T20:29:29	openvpn[56970]	MANAGEMENT: CMD 'state all'	 
2021-10-24T20:29:29	openvpn[56970]	MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock	 
2021-10-24T19:47:42	openvpn[56970]	Initialization Sequence Completed	 
2021-10-24T19:47:42	openvpn[56970]	/sbin/route add -net 128.0.0.0 10.22.0.1 128.0.0.0	 
2021-10-24T19:47:42	openvpn[56970]	/sbin/route add -net 0.0.0.0 10.22.0.1 128.0.0.0	 
2021-10-24T19:47:42	openvpn[56970]	/sbin/route add -net 46.166.187.48 80.56.107.1 255.255.255.255	 
2021-10-24T19:47:32	openvpn[56970]	/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup ovpnc1 1500 1657 10.22.0.10 255.255.0.0 init	 
2021-10-24T19:47:32	openvpn[56970]	/sbin/route add -net 10.22.0.0 10.22.0.1 255.255.0.0	 
2021-10-24T19:47:32	openvpn[56970]	/sbin/ifconfig ovpnc1 10.22.0.10 10.22.0.1 mtu 1500 netmask 255.255.0.0 up	 
2021-10-24T19:47:32	openvpn[56970]	TUN/TAP device /dev/tun1 opened	 
2021-10-24T19:47:32	openvpn[56970]	TUN/TAP device ovpnc1 exists previously, keep at program end	 
2021-10-24T19:47:32	openvpn[56970]	ROUTE_GATEWAY 80.56.107.1/255.255.255.0 IFACE=igb0 HWADDR=00:c0:e7:e0:09:38	 
2021-10-24T19:47:31	openvpn[56970]	/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkdown ovpnc1 1500 1657 10.30.0.5 255.255.0.0 init	 
2021-10-24T19:47:31	openvpn[56970]	Closing TUN/TAP interface	 
2021-10-24T19:47:31	openvpn[56970]	/sbin/route delete -net 128.0.0.0 10.30.0.1 128.0.0.0	 
2021-10-24T19:47:31	openvpn[56970]	/sbin/route delete -net 0.0.0.0 10.30.0.1 128.0.0.0	 
2021-10-24T19:47:31	openvpn[56970]	/sbin/route delete -net 46.166.187.48 80.56.107.1 255.255.255.255	 
2021-10-24T19:47:31	openvpn[56970]	NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.	 
2021-10-24T19:47:31	openvpn[56970]	Preserving previous TUN/TAP instance: ovpnc1	 
2021-10-24T19:47:31	openvpn[56970]	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T19:47:31	openvpn[56970]	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: data channel crypto options modified	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: adjusting link_mtu to 1657	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: peer-id set	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: route-related options modified	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: route options modified	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: --ifconfig/up options modified	 
2021-10-24T19:47:31	openvpn[56970]	NOTE: setsockopt TCP_NODELAY=1 failed	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: --socket-flags option modified	 
2021-10-24T19:47:31	openvpn[56970]	Socket Buffers: R=[524288->524288] S=[524288->524288]	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: --sndbuf/--rcvbuf options modified	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: compression parms modified	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: explicit notify parm(s) modified	 
2021-10-24T19:47:31	openvpn[56970]	OPTIONS IMPORT: timers and/or timeouts modified	 
2021-10-24T19:47:31	openvpn[56970]	PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.22.0.1,sndbuf 524288,rcvbuf 524288,redirect-gateway def1,explicit-exit-notify,comp-lzo no,route-gateway 10.22.0.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.22.0.10 255.255.0.0,peer-id 393224,cipher AES-256-GCM'	 
2021-10-24T19:47:31	openvpn[56970]	SENT CONTROL [node-nl-45.protonvpn.net]: 'PUSH_REQUEST' (status=1)	 
2021-10-24T19:47:30	openvpn[56970]	[node-nl-45.protonvpn.net] Peer Connection Initiated with [AF_INET]46.166.187.48:443 (via [AF_INET]80.56.107.37%)	 
2021-10-24T19:47:30	openvpn[56970]	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256	 
2021-10-24T19:47:30	openvpn[56970]	WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA512'	 
2021-10-24T19:47:30	openvpn[56970]	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1582', remote='link-mtu 1634'	 
2021-10-24T19:47:30	openvpn[56970]	VERIFY OK: depth=0, CN=node-nl-45.protonvpn.net	 
2021-10-24T19:47:30	openvpn[56970]	VERIFY EKU OK	 
2021-10-24T19:47:30	openvpn[56970]	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication	 
2021-10-24T19:47:30	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T19:47:30	openvpn[56970]	++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T19:47:30	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.7.3.2, expects TLS Web Server Authentication	 
2021-10-24T19:47:30	openvpn[56970]	++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Server Authentication	 
2021-10-24T19:47:30	openvpn[56970]	Validating certificate extended key usage	 
2021-10-24T19:47:30	openvpn[56970]	VERIFY KU OK	 
2021-10-24T19:47:30	openvpn[56970]	VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1	 
2021-10-24T19:47:30	openvpn[56970]	VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA	 
2021-10-24T19:47:30	openvpn[56970]	TLS: Initial packet from [AF_INET]46.166.187.48:443 (via [AF_INET]80.56.107.37%), sid=df1df491 f434ca00	 
2021-10-24T19:47:30	openvpn[56970]	UDP link remote: [AF_INET]46.166.187.48:443	 
2021-10-24T19:47:30	openvpn[56970]	UDP link local: (not bound)	 
2021-10-24T19:47:30	openvpn[56970]	NOTE: setsockopt TCP_NODELAY=1 failed	 
2021-10-24T19:47:30	openvpn[56970]	Socket Buffers: R=[42080->524288] S=[57344->524288]	 
2021-10-24T19:47:30	openvpn[56970]	TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.187.48:443	 
2021-10-24T19:47:30	openvpn[56970]	Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication	 
2021-10-24T19:47:30	openvpn[56970]	Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication	 
2021-10-24T19:47:30	openvpn[56970]	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts	 
2021-10-24T19:47:25	openvpn[56970]	MANAGEMENT: Client disconnected	 
2021-10-24T19:47:25	openvpn[56970]	MANAGEMENT: TCP send error: Broken pipe	 
2021-10-24T19:47:25	openvpn[56970]	MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock	 
2021-10-24T19:47:25	openvpn[56970]	Restart pause, 5 second(s)	 
2021-10-24T19:47:25	openvpn[56970]	SIGUSR1[soft,ping-restart] received, process restarting	 
2021-10-24T19:47:25	openvpn[56970]	[node-nl-45.protonvpn.net] Inactivity timeout (--ping-restart), restarting	 
2021-10-24T19:47:25	openvpn[56970]	MANAGEMENT: Client disconnected	 
2021-10-24T19:47:25	openvpn[56970]	MANAGEMENT: TCP send error: Broken pipe	 
2021-10-24T19:47:25	openvpn[56970]	MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock	 
2021-10-24T19:47:25	openvpn[56970]	Initialization Sequence Completed	 
2021-10-24T19:47:25	openvpn[56970]	/sbin/route add -net 128.0.0.0 10.30.0.1 128.0.0.0	 
2021-10-24T19:47:25	openvpn[56970]	/sbin/route add -net 0.0.0.0 10.30.0.1 128.0.0.0	 
[b]2021-10-24T19:47:25	openvpn[56970]	/sbin/route add -net 46.166.187.48 80.56.107.1 255.255.255.255	[/b] 
2021-10-24T19:45:25	openvpn[56970]	/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup ovpnc1 1500 1657 10.30.0.5 255.255.0.0 init	 
2021-10-24T19:45:25	openvpn[56970]	/sbin/route add -net 10.30.0.0 10.30.0.1 255.255.0.0	 
2021-10-24T19:45:25	openvpn[56970]	/sbin/ifconfig ovpnc1 10.30.0.5 10.30.0.1 mtu 1500 netmask 255.255.0.0 up	 
2021-10-24T19:45:25	openvpn[56970]	TUN/TAP device /dev/tun1 opened	 
2021-10-24T19:45:25	openvpn[56970]	TUN/TAP device ovpnc1 exists previously, keep at program end	 
2021-10-24T19:45:25	openvpn[56970]	ROUTE_GATEWAY 80.56.107.1/255.255.255.0 IFACE=igb0 HWADDR=00:c0:e7:e0:09:38	 
2021-10-24T19:45:23	openvpn[56970]	/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkdown ovpnc1 1500 1657 10.21.0.2 255.255.0.0 init	 
2021-10-24T19:45:23	openvpn[56970]	Closing TUN/TAP interface	 
2021-10-24T19:45:23	openvpn[56970]	/sbin/route delete -net 128.0.0.0 10.21.0.1 128.0.0.0	 
2021-10-24T19:45:23	openvpn[56970]	/sbin/route delete -net 0.0.0.0 10.21.0.1 128.0.0.0	 
2021-10-24T19:45:23	openvpn[56970]	/sbin/route delete -net 46.166.187.48 80.56.107.1 255.255.255.255	 
2021-10-24T19:45:23	openvpn[56970]	NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.	 
2021-10-24T19:45:23	openvpn[56970]	Preserving previous TUN/TAP instance: ovpnc1	 
2021-10-24T19:45:23	openvpn[56970]	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T19:45:23	openvpn[56970]	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: data channel crypto options modified	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: adjusting link_mtu to 1657	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: peer-id set	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: route-related options modified	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: route options modified	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: --ifconfig/up options modified	 
2021-10-24T19:45:23	openvpn[56970]	NOTE: setsockopt TCP_NODELAY=1 failed	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: --socket-flags option modified	 
2021-10-24T19:45:23	openvpn[56970]	Socket Buffers: R=[524288->524288] S=[524288->524288]	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: --sndbuf/--rcvbuf options modified	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: compression parms modified	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: explicit notify parm(s) modified	 
2021-10-24T19:45:23	openvpn[56970]	OPTIONS IMPORT: timers and/or timeouts modified	 
2021-10-24T19:45:23	openvpn[56970]	PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.30.0.1,sndbuf 524288,rcvbuf 524288,redirect-gateway def1,explicit-exit-notify,comp-lzo no,route-gateway 10.30.0.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.30.0.5 255.255.0.0,peer-id 917507,cipher AES-256-GCM'	 
2021-10-24T19:45:23	openvpn[56970]	SENT CONTROL [node-nl-45.protonvpn.net]: 'PUSH_REQUEST' (status=1)	 
2021-10-24T19:45:22	openvpn[56970]	[node-nl-45.protonvpn.net] Peer Connection Initiated with [AF_INET]46.166.187.48:443 (via [AF_INET]80.56.107.37%)	 
2021-10-24T19:45:22	openvpn[56970]	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256	 
2021-10-24T19:45:22	openvpn[56970]	WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA512'	 
2021-10-24T19:45:22	openvpn[56970]	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1582', remote='link-mtu 1634'	 
2021-10-24T19:45:22	openvpn[56970]	VERIFY OK: depth=0, CN=node-nl-45.protonvpn.net	 
2021-10-24T19:45:22	openvpn[56970]	VERIFY EKU OK	 
2021-10-24T19:45:22	openvpn[56970]	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication	 
2021-10-24T19:45:22	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T19:45:22	openvpn[56970]	++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T19:45:22	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.7.3.2, expects TLS Web Server Authentication	 
2021-10-24T19:45:22	openvpn[56970]	++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Server Authentication	 
2021-10-24T19:45:22	openvpn[56970]	Validating certificate extended key usage	 
2021-10-24T19:45:22	openvpn[56970]	VERIFY KU OK	 
2021-10-24T19:45:22	openvpn[56970]	VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1	 
2021-10-24T19:45:22	openvpn[56970]	VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA	 
2021-10-24T19:45:22	openvpn[56970]	TLS: Initial packet from [AF_INET]46.166.187.48:443 (via [AF_INET]80.56.107.37%), sid=97abea17 65ad7b91	 
2021-10-24T19:45:22	openvpn[56970]	UDP link remote: [AF_INET]46.166.187.48:443	 
2021-10-24T19:45:22	openvpn[56970]	UDP link local: (not bound)	 
2021-10-24T19:45:22	openvpn[56970]	NOTE: setsockopt TCP_NODELAY=1 failed	 
2021-10-24T19:45:22	openvpn[56970]	Socket Buffers: R=[42080->524288] S=[57344->524288]	 
2021-10-24T19:45:22	openvpn[56970]	TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.187.48:443	 
2021-10-24T19:45:22	openvpn[56970]	Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication	 
2021-10-24T19:45:22	openvpn[56970]	Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication	 
2021-10-24T19:45:22	openvpn[56970]	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts	 
2021-10-24T19:45:17	openvpn[56970]	Restart pause, 5 second(s)	 
2021-10-24T19:45:17	openvpn[56970]	SIGUSR1[soft,ping-restart] received, process restarting	 
2021-10-24T19:45:17	openvpn[56970]	[node-nl-45.protonvpn.net] Inactivity timeout (--ping-restart), restarting	 
2021-10-24T19:45:17	openvpn[56970]	Initialization Sequence Completed	 
2021-10-24T19:45:17	openvpn[56970]	/sbin/route add -net 128.0.0.0 10.21.0.1 128.0.0.0	 
2021-10-24T19:45:17	openvpn[56970]	/sbin/route add -net 0.0.0.0 10.21.0.1 128.0.0.0	 
[b]2021-10-24T19:45:17	openvpn[56970]	/sbin/route add -net 46.166.187.48 80.56.107.1 255.255.255.255	[/b] 
2021-10-24T19:43:17	openvpn[56970]	/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup ovpnc1 1500 1656 10.21.0.2 255.255.0.0 init	 
2021-10-24T19:43:17	openvpn[56970]	/sbin/route add -net 10.21.0.0 10.21.0.1 255.255.0.0	 
2021-10-24T19:43:17	openvpn[56970]	/sbin/ifconfig ovpnc1 10.21.0.2 10.21.0.1 mtu 1500 netmask 255.255.0.0 up	 
2021-10-24T19:43:17	openvpn[56970]	TUN/TAP device /dev/tun1 opened	 
2021-10-24T19:43:17	openvpn[56970]	TUN/TAP device ovpnc1 exists previously, keep at program end	 
2021-10-24T19:43:17	openvpn[56970]	ROUTE_GATEWAY 80.56.107.1/255.255.255.0 IFACE=igb0 HWADDR=00:c0:e7:e0:09:38	 
2021-10-24T19:43:17	openvpn[56970]	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T19:43:17	openvpn[56970]	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: data channel crypto options modified	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: adjusting link_mtu to 1656	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: peer-id set	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: route-related options modified	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: route options modified	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: --ifconfig/up options modified	 
2021-10-24T19:43:17	openvpn[56970]	NOTE: setsockopt TCP_NODELAY=1 failed	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: --socket-flags option modified	 
2021-10-24T19:43:17	openvpn[56970]	Socket Buffers: R=[42080->524288] S=[57344->524288]	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: --sndbuf/--rcvbuf options modified	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: compression parms modified	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: explicit notify parm(s) modified	 
2021-10-24T19:43:17	openvpn[56970]	OPTIONS IMPORT: timers and/or timeouts modified	 
2021-10-24T19:43:17	openvpn[56970]	PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.21.0.1,sndbuf 524288,rcvbuf 524288,redirect-gateway def1,explicit-exit-notify,comp-lzo no,route-gateway 10.21.0.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.21.0.2 255.255.0.0,peer-id 327681,cipher AES-256-GCM'	 
2021-10-24T19:43:17	openvpn[56970]	SENT CONTROL [node-nl-45.protonvpn.net]: 'PUSH_REQUEST' (status=1)	 
2021-10-24T19:43:16	openvpn[56970]	MANAGEMENT: Client disconnected	 
2021-10-24T19:43:16	openvpn[56970]	MANAGEMENT: CMD 'state all'	 
2021-10-24T19:43:16	openvpn[56970]	MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock	 
2021-10-24T19:43:16	openvpn[56970]	[node-nl-45.protonvpn.net] Peer Connection Initiated with [AF_INET]46.166.187.48:443 (via [AF_INET]80.56.107.37%)	 
2021-10-24T19:43:16	openvpn[56970]	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256	 
2021-10-24T19:43:16	openvpn[56970]	WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'	 
2021-10-24T19:43:16	openvpn[56970]	WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA512'	 
2021-10-24T19:43:16	openvpn[56970]	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1581', remote='link-mtu 1634'	 
2021-10-24T19:43:16	openvpn[56970]	VERIFY OK: depth=0, CN=node-nl-45.protonvpn.net	 
2021-10-24T19:43:16	openvpn[56970]	VERIFY EKU OK	 
2021-10-24T19:43:16	openvpn[56970]	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication	 
2021-10-24T19:43:16	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T19:43:16	openvpn[56970]	++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication	 
2021-10-24T19:43:16	openvpn[56970]	++ Certificate has EKU (oid) 1.3.6.1.5.5.7.3.2, expects TLS Web Server Authentication	 
2021-10-24T19:43:16	openvpn[56970]	++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Server Authentication	 
2021-10-24T19:43:16	openvpn[56970]	Validating certificate extended key usage	 
2021-10-24T19:43:16	openvpn[56970]	VERIFY KU OK	 
2021-10-24T19:43:16	openvpn[56970]	VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1	 
2021-10-24T19:43:16	openvpn[56970]	VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA	 
2021-10-24T19:43:16	openvpn[56970]	TLS: Initial packet from [AF_INET]46.166.187.48:443 (via [AF_INET]80.56.107.37%), sid=9c8e2fec a110d39d	 
2021-10-24T19:43:16	openvpn[56970]	UDP link remote: [AF_INET]46.166.187.48:443	 
2021-10-24T19:43:16	openvpn[56970]	UDP link local: (not bound)	 
2021-10-24T19:43:16	openvpn[56970]	Socket Buffers: R=[42080->42080] S=[57344->57344]	 
2021-10-24T19:43:16	openvpn[56970]	TCP/UDP: Preserving recently used remote address: [AF_INET]46.166.187.48:443	 
2021-10-24T19:43:16	openvpn[56970]	Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication	 
2021-10-24T19:43:16	openvpn[56970]	Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication	 
2021-10-24T19:43:16	openvpn[56970]	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts	 
2021-10-24T19:43:16	openvpn[56970]	MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1.sock	 
2021-10-24T19:43:16	openvpn[37856]	library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10	 
2021-10-24T19:43:16	openvpn[37856]	OpenVPN 2.5.3 amd64-portbld-freebsd12.1 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Sep 21 2021	 
2021-10-24T19:43:16	openvpn[37856]	WARNING: file '/var/etc/openvpn/client1.up' is group or others accessible