Sat May 25 20:56:56 2019 daemon.info fastd[2254]: sending handshake to <mesh_vpn_backbone_peer_vpn4>[185.176.163.18:1234]...
Sat May 25 20:56:57 2019 daemon.info fastd[2254]: received handshake response from <mesh_vpn_backbone_peer_vpn4>[185.176.163.18:1234] using fastd v18
Sat May 25 20:56:57 2019 kern.info kernel: [   34.764618] batman_adv: bat0: Adding interface: mesh-vpn
Sat May 25 20:56:57 2019 kern.info kernel: [   34.770162] batman_adv: bat0: The MTU of interface mesh-vpn is too small (1426) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
Sat May 25 20:56:57 2019 kern.info kernel: [   34.795016] batman_adv: bat0: Interface activated: mesh-vpn
Sat May 25 20:56:57 2019 daemon.err odhcp6c[1350]: Failed to send DHCPV6 message to ff02::1:2 (Operation not permitted)
Sat May 25 20:56:58 2019 daemon.info fastd[2254]: 185.176.163.18:1234 authorized as <mesh_vpn_backbone_peer_vpn4>
Sat May 25 20:56:58 2019 daemon.notice fastd[2254]: connection with <mesh_vpn_backbone_peer_vpn4> established.
Sat May 25 20:56:58 2019 daemon.info fastd[2254]: new session with <mesh_vpn_backbone_peer_vpn4> established using method `null+salsa2012+umac'.