Hi,
we are having problems with two different TRB245 on the filed, both on version 7.13.4. On both of them we lost access to the OpenVPN. When we regained access via IPv6, we checked the OpenVPN instance configuration and it was correct but the ovpn file appeared missing. Trying to export it gives us an error. After uploading again the the ovpn the openvpn started working again.
These are the openvpn logs before and after we reuploaded the file.
375 Wed Mar 11 15:32:58 2026 daemon.err openvpn(rebernig)[3400]: Options error: You must define TUN/TAP device (–dev)
376 Wed Mar 11 15:32:58 2026 daemon.warn openvpn(rebernig)[3400]: Use --help for more information.
382 Wed Mar 11 15:33:03 2026 daemon.err openvpn(rebernig)[3748]: Options error: You must define TUN/TAP device (–dev)
383 Wed Mar 11 15:33:03 2026 daemon.warn openvpn(rebernig)[3748]: Use --help for more information.
385 Wed Mar 11 15:33:09 2026 daemon.err openvpn(rebernig)[3984]: Options error: You must define TUN/TAP device (–dev)
386 Wed Mar 11 15:33:09 2026 daemon.warn openvpn(rebernig)[3984]: Use --help for more information.
387 Wed Mar 11 15:33:16 2026 daemon.err openvpn(rebernig)[4143]: Options error: You must define TUN/TAP device (–dev)
388 Wed Mar 11 15:33:16 2026 daemon.warn openvpn(rebernig)[4143]: Use --help for more information.
394 Wed Mar 11 15:33:22 2026 daemon.err openvpn(rebernig)[4313]: Options error: You must define TUN/TAP device (–dev)
395 Wed Mar 11 15:33:22 2026 daemon.warn openvpn(rebernig)[4313]: Use --help for more information.
404 Wed Mar 11 15:33:28 2026 daemon.err openvpn(rebernig)[4449]: Options error: You must define TUN/TAP device (–dev)
405 Wed Mar 11 15:33:28 2026 daemon.warn openvpn(rebernig)[4449]: Use --help for more information.
730 Wed Mar 11 15:43:21 2026 daemon.warn openvpn(rebernig)[8411]: WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless “allow-compression yes” is also set.
731 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add ‘–data-ciphers-fallback BF-CBC’ to your configuration and/or add BF-CBC to --data-ciphers.
732 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: Note: ‘–allow-compression’ is not set to ‘no’, disabling data channel offload.
733 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: OpenVPN 2.6.9 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH/PKTINFO] [AEAD] [DCO]
734 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: library versions: OpenSSL 3.0.14 4 Jun 2024, LZO 2.10
735 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: DCO version: N/A
736 Wed Mar 11 15:43:21 2026 daemon.warn openvpn(rebernig)[8411]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
737 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
738 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
739 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: LZO compression initializing
740 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
741 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
742 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: TCP/UDP: Preserving recently used remote address: [AF_INET]4.232.241.159:1194
743 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: Socket Buffers: R=[180224->180224] S=[180224->180224]
744 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: UDPv4 link local: (not bound)
745 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: UDPv4 link remote: [AF_INET]4.232.241.159:1194
746 Wed Mar 11 15:43:21 2026 daemon.notice openvpn(rebernig)[8411]: TLS: Initial packet from [AF_INET]4.232.241.159:1194, sid=cf18ae0b db0bcef3
747 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: VERIFY OK: depth=1, CN=OpenVPN Cadriano
748 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: VERIFY KU OK
749 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: Validating certificate extended key usage
750 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
751 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: VERIFY EKU OK
752 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: VERIFY OK: depth=0, REDACTED
753 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
754 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: [vpn.trailslight.com] Peer Connection Initiated with [AF_INET]4.232.241.159:1194
755 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
756 Wed Mar 11 15:43:22 2026 daemon.notice openvpn(rebernig)[8411]: TLS: tls_multi_process: initial untrusted session promoted to trusted
757 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: SENT CONTROL [vpn.trailslight.com]: ‘PUSH_REQUEST’ (status=1)
758 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: PUSH: Received control message: ‘PUSH_REPLY,route 10.244.0.0 255.255.0.0,dhcp-option DOMAIN-SEARCH openvpn.svc.cluster.local,dhcp-option DOMAIN-SEARCH svc.cluster.local,dhcp-option DOMAIN-SEARCH cluster.local,dhcp-option DOMAIN-SEARCH REDACTED,dhcp-option DNS 10.0.0.10,comp-lzo no,route 10.240.0.0 255.255.0.0,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.30 10.240.0.29,peer-id 1,cipher AES-256-GCM’
759 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: OPTIONS IMPORT: --ifconfig/up options modified
760 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: OPTIONS IMPORT: route options modified
761 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
762 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_best_gw query: dst 0.0.0.0
763 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_best_gw result: via 0.0.0.0 dev qmimux0
764 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: TUN/TAP device tun_c_rebernig opened
765 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: do_ifconfig, ipv4=1, ipv6=0
766 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: net_iface_mtu_set: mtu 1500 for tun_c_rebernig
767 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: net_iface_up: set tun_c_rebernig up
768 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: net_addr_ptp_v4_add: 10.240.0.30 peer 10.240.0.29 dev tun_c_rebernig
769 Wed Mar 11 15:43:23 2026 daemon.notice openvpn(rebernig)[8411]: /usr/libexec/openvpn-hotplug up rebernig tun_c_rebernig 1500 0 10.240.0.30 10.240.0.29 init
770 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_add: 192.168.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
771 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_add: 10.244.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
772 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_add: 10.240.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
773 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: Data Channel MTU parms [ mss_fix:1399 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
774 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
775 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
776 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: Initialization Sequence Completed
777 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: Data Channel: cipher ‘AES-256-GCM’, peer-id: 1, compression: ‘stub’
778 Wed Mar 11 15:43:25 2026 daemon.notice openvpn(rebernig)[8411]: Timers: ping 10, ping-restart 60
810 Wed Mar 11 15:43:40 2026 daemon.err openvpn(rebernig)[8411]: event_wait : Interrupted system call (fd=-1,code=4)
811 Wed Mar 11 15:43:40 2026 daemon.notice openvpn(rebernig)[8411]: TCP/UDP: Closing socket
812 Wed Mar 11 15:43:40 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_del: 192.168.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
813 Wed Mar 11 15:43:40 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_del: 10.244.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
814 Wed Mar 11 15:43:40 2026 daemon.notice openvpn(rebernig)[8411]: net_route_v4_del: 10.240.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
815 Wed Mar 11 15:43:40 2026 daemon.notice openvpn(rebernig)[8411]: Closing TUN/TAP interface
816 Wed Mar 11 15:43:40 2026 daemon.notice openvpn(rebernig)[8411]: net_addr_ptp_v4_del: 10.240.0.30 dev tun_c_rebernig
817 Wed Mar 11 15:43:40 2026 daemon.notice openvpn(rebernig)[8411]: /usr/libexec/openvpn-hotplug down rebernig tun_c_rebernig 1500 0 10.240.0.30 10.240.0.29 init
818 Wed Mar 11 15:43:41 2026 daemon.notice openvpn(rebernig)[8411]: SIGTERM[hard,] received, process exiting
819 Wed Mar 11 15:43:41 2026 daemon.warn openvpn(rebernig)[8839]: WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless “allow-compression yes” is also set.
820 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add ‘–data-ciphers-fallback BF-CBC’ to your configuration and/or add BF-CBC to --data-ciphers.
821 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: Note: ‘–allow-compression’ is not set to ‘no’, disabling data channel offload.
822 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: OpenVPN 2.6.9 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH/PKTINFO] [AEAD] [DCO]
823 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: library versions: OpenSSL 3.0.14 4 Jun 2024, LZO 2.10
824 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: DCO version: N/A
825 Wed Mar 11 15:43:42 2026 daemon.warn openvpn(rebernig)[8839]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
826 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
827 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
828 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: LZO compression initializing
829 Wed Mar 11 15:43:42 2026 daemon.notice openvpn(rebernig)[8839]: Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
830 Wed Mar 11 15:43:44 2026 daemon.notice openvpn(rebernig)[8839]: Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
831 Wed Mar 11 15:43:44 2026 daemon.notice openvpn(rebernig)[8839]: TCP/UDP: Preserving recently used remote address: [AF_INET]4.232.241.159:1194
832 Wed Mar 11 15:43:44 2026 daemon.notice openvpn(rebernig)[8839]: Socket Buffers: R=[180224->180224] S=[180224->180224]
833 Wed Mar 11 15:43:44 2026 daemon.notice openvpn(rebernig)[8839]: UDPv4 link local: (not bound)
834 Wed Mar 11 15:43:44 2026 daemon.notice openvpn(rebernig)[8839]: UDPv4 link remote: [AF_INET]4.232.241.159:1194
835 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: TLS: Initial packet from [AF_INET]4.232.241.159:1194, sid=ee89e716 ae5d005a
861 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: VERIFY OK: depth=1, CN=OpenVPN Cadriano
865 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: VERIFY KU OK
866 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: Validating certificate extended key usage
867 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
868 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: VERIFY EKU OK
869 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: VERIFY OK: depth=0, CN=REDACTED
870 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
871 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: [REDACTED] Peer Connection Initiated with [AF_INET]4.232.241.159:1194
872 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
873 Wed Mar 11 15:43:45 2026 daemon.notice openvpn(rebernig)[8839]: TLS: tls_multi_process: initial untrusted session promoted to trusted
874 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: SENT CONTROL [REDACTED]: ‘PUSH_REQUEST’ (status=1)
875 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: PUSH: Received control message: ‘PUSH_REPLY,route 10.244.0.0 255.255.0.0,dhcp-option DOMAIN-SEARCH openvpn.svc.cluster.local,dhcp-option DOMAIN-SEARCH svc.cluster.local,dhcp-option DOMAIN-SEARCH cluster.local,dhcp-option DOMAIN-SEARCH REDACTED,dhcp-option DNS 10.0.0.10,comp-lzo no,route 10.240.0.0 255.255.0.0,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.30 10.240.0.29,peer-id 53,cipher AES-256-GCM’
876 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: OPTIONS IMPORT: --ifconfig/up options modified
877 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: OPTIONS IMPORT: route options modified
878 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
879 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: net_route_v4_best_gw query: dst 0.0.0.0
880 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: net_route_v4_best_gw result: via 0.0.0.0 dev qmimux0
881 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: TUN/TAP device tun_c_rebernig opened
882 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: do_ifconfig, ipv4=1, ipv6=0
883 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: net_iface_mtu_set: mtu 1500 for tun_c_rebernig
884 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: net_iface_up: set tun_c_rebernig up
885 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: net_addr_ptp_v4_add: 10.240.0.30 peer 10.240.0.29 dev tun_c_rebernig
886 Wed Mar 11 15:43:46 2026 daemon.notice openvpn(rebernig)[8839]: /usr/libexec/openvpn-hotplug up rebernig tun_c_rebernig 1500 0 10.240.0.30 10.240.0.29 init
887 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: net_route_v4_add: 192.168.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
888 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: net_route_v4_add: 10.244.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
889 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: net_route_v4_add: 10.240.0.0/16 via 10.240.0.29 dev [NULL] table 0 metric -1
890 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: Data Channel MTU parms [ mss_fix:1399 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
891 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
892 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
893 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: Initialization Sequence Completed
894 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: Data Channel: cipher ‘AES-256-GCM’, peer-id: 53, compression: ‘stub’
895 Wed Mar 11 15:43:48 2026 daemon.notice openvpn(rebernig)[8839]: Timers: ping 10, ping-restart 60