Openvpn log data - are fixes required

I have been trying to learn about openvpn and trying to learn what is going on from the openvpn log.

My initial trials have thrown up quite a few problems but these may be due to my own lack of knowledge but I did receive some errors which were reported in the log and would appreciate help and advice on either getting updates or correcting the errors. My log is below:-

2023-10-17 20:13:32.730 T:32583    info <general>: VPN Mgr : (vpnplatform.py) No VPN configuration  exists to write
2023-10-17 20:13:32.786 T:32583    info <general>: VPN Mgr : (vpnplatform.py) VPN log file start >>>
2023-10-17 20:13:32.786 T:32583    info <general>: 2023-10-16 22:41:35 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2023-10-17 20:13:32.786 T:32583    info <general>: 2023-10-16 22:41:35 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2023-10-17 20:13:32.786 T:32583    info <general>: 2023-10-16 22:41:35 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
2023-10-17 20:13:32.786 T:32583    info <general>: 2023-10-16 22:41:35 WARNING: file '/home/osmc/.kodi/addons/service.vpn.manager/IPVanish/pass.txt' is group or others accessible
2023-10-17 20:13:32.786 T:32583    info <general>: 2023-10-16 22:41:35 OpenVPN 2.5.1 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
2023-10-17 20:13:32.787 T:32583    info <general>: 2023-10-16 22:41:35 library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
2023-10-17 20:13:32.787 T:32583    info <general>: 2023-10-16 22:41:50 RESOLVE: Cannot resolve host address: par-a20.ipvanish.com:443 (Name or service not known)
2023-10-17 20:13:32.787 T:32583    info <general>: 2023-10-16 22:42:10 RESOLVE: Cannot resolve host address: par-a20.ipvanish.com:443 (Name or service not known)
2023-10-17 20:13:32.787 T:32583    info <general>: 2023-10-16 22:42:30 RESOLVE: Cannot resolve host address: par-a20.ipvanish.com:443 (Name or service not known)
2023-10-17 20:13:32.787 T:32583    info <general>: 2023-10-16 22:42:50 RESOLVE: Cannot resolve host address: par-a20.ipvanish.com:443 (Name or service not known)
2023-10-17 20:13:32.787 T:32583    info <general>: VPN Mgr : (vpnplatform.py) <<< VPN log file end
2023-10-17 20:13:32.832 T:32583    info <general>: VPN Mgr : (managefiles.py) Copying log file to /media/11_USB_16G/kodi_23-10-17_20-13-32.log.  Using version 7.0.3

It seems to me there are serious issues with password security and other potential leaks but as I am not a coder I am posting the log and hope somebody has time to help. Please ignore the proprietary stuff which I believe is an artefact of one particular offering. It is the openvpn part that worries me.

This means the password is viewable by other users.

But I’d guess that you have not even changed your default OSMC password from osmc…

I figured this which is why I asked the question. Not sure of the significance of my Vero 4K password if it is viewable in plain text. Why is it not encrypted? BTW your guess is wrong this time if that helps.