View attachment 17708
i like this..
The only change there is that the Protocol field is now a dropdown instead of a text input field.
View attachment 17708
i like this..
I searched the forum, but found no answer..
Does anyone know an answer to my question about making the Certificate of the HTTPS Local Access more permanent?
I searched the forum, but found no answer..
Try thisDoes anyone know an answer to my question about making the Certificate of the HTTPS Local Access more permanent?
I searched the forum, but found no answer..
I’m on 400/20 and using Cloudflare DNS as well. I use the same settings you posted, minus ‘Use local caching DNS Server’ is set to No. I seriously can’t tell a difference between Yes and No. Pages load very quickly regardless of which setting is used. I like the ‘safer and more reliable’ comment in the commit in regards to DNS Privacy and the new default, so I will keep it set to No. Though I can see changing that setting, if there’s an issue with a particular configuration. Maybe your configuration benefits from setting it to Yes?https://www.snbforums.com/threads/384-12_alpha-builds-testing-all-variants.56639/page-11#post-493386
As an update to my post above, I have now tested all possible scenarios with Connect to DNS Server Automatically (using ISP's or CloudFlare DNS servers) and Use local caching DNS Server (in Other Settings) set either to Yes or No.
By far, on my Fibre 1Gbps up/down symmetrical connection, the best combination is 'No' and using the CloudFlare DNS servers and 'Yes' for Use local caching. The page load times are noticeably faster than any other combination I tried. I feel like I'm 'surfing' the net like a 19-year-old, so fast and limber.
View attachment 17812 View attachment 17813
View attachment 17814
OK this works, even after reboots it sticks! Thanks!You should be able to generate a certificate from the ddns page. I don't see why that wouldn't be permanent.
Do you have AiProtection enabled? I’m just wondering if the “wred” process on the router was generating DNS requests to the TrendMicro servers while you were using the ISP DNS servers that were slow or timing out. These would be impacted by the setting, and since you’re very certain of the speed difference there has to be an explanation somewhere.I don't use benchmark tools.
We're in total agreement there.
I also agree that the images won't be on different sites either. But my issue and at least one other person was that originally, checking for updates in amtm was taking 2 minutes or more (for 8 scripts including amtm).
Thank you for the additional information, but this is the best set up as-is. All websites load as they should, no issues at all. The extra responsiveness is just a bonus I don't want to forgo right now.
it is a nice concept, but this is still the equivalence of using a self signed cert. as apposed to a verified.This is how I enabled HTTPS on port 8443 log in: https://github.com/kvic-z/pixelserv-tls/wiki/[ASUSWRT]-Use-Pixelserv-CA-to-issue-a-certificate-for-WebGUI
I ran that once and it has been perminate ever since. Note that I did run Diversion first so that way a certificate was already created for me when Diversion installed Pixelserv.
#!/bin/sh
if [ "$(nvram get dns_local_cache)" = "1" ]; then
{
NTPSERVERS=""
for VAR in 0 1; do
NTP="$(nvram get "ntp_server$VAR")"
[ -n "$NTP" ] && NTPSERVERS="$NTPSERVERS/$NTP"
done
[ -z "$NTPSERVERS" ] && NTPSERVERS="/pool.ntp.org"
for DNS in $(nvram get wan_dns); do
echo "server=$NTPSERVERS/$DNS"
done
for VAR in 1 2 3; do
DNS="$(nvram get "ipv6_dns$VAR")"
[ -n "$DNS" ] && echo "server=$NTPSERVERS/$DNS"
done
} >> "$1"
fi
Do you have AiProtection enabled? I’m just wondering if the “wred” process on the router was generating DNS requests to the TrendMicro servers while you were using the ISP DNS servers that were slow or timing out. These would be impacted by the setting, and since you’re very certain of the speed difference there has to be an explanation somewhere.
This is how I enabled HTTPS on port 8443 log in: https://github.com/kvic-z/pixelserv-tls/wiki/[ASUSWRT]-Use-Pixelserv-CA-to-issue-a-certificate-for-WebGUI
I ran that once and it has been perminate ever since. Note that I did run Diversion first so that way a certificate was already created for me when Diversion installed Pixelserv.
Try without $I ran the helper script and get this error:
-sh: $: not found
Not sure if I'm missing something or not seeing if I'm supposed to put a local data set in there in place of the $
sh -c "$(wget -qO - https://kazoo.ga/pixelserv-tls/config-webgui.sh)"
That did it. TYVM!Try without $
Code:sh -c "$(wget -qO - https://kazoo.ga/pixelserv-tls/config-webgui.sh)"
While this works perfectly with Chrome, I can’t get it to work with Firefox.I know I can use the DDNS page, but that still isn't automatic, and above all I have no need to let DDNS enabled..
OK this works, even after reboots it sticks! Thanks!
Did not expect that, I thought you needed to use "Enable the DDNS Client" and leave it ON and use the option "Free Certificate from Let's Encrypt"...
Obviously all that is needed is to enable "Import/Persistent Auto-generated" and click apply (with "Generate a new certificate" set to "Yes").
View attachment 17864
But I am now confused, why does the router itself not enable this option after enabling HTTPS LAN access. I always wondered why it even links you to the DDNS page "Click here to manage.", while there was nothing to manage there.
It is weird the router does not set this on its own, it would ease the life of many.
Is it possible to implement in the FW to automate this process, so that it does it automatically after choosing the HTTPS option (or BOTH) in Authentication Method?
It is precisely with Firefox its working! (as with IE and Edge)While this works perfectly with Chrome, I can’t get it to work with Firefox.
After importing the cert file into Chrome, I get a solid padlock beside the URL when logging into my router. When I import the cert into Firefox, I get the same as you do. Now when I use Kvics script and import the certs into Chrome or Firefox I get a solid padlock on both. Green for Firefox when logging into my router.It is precisely with Firefox its working! (as with IE and Edge)
Although in Firefox I still have the yellow "!" triangle but who cares (because FF does not "trust" personal Certificates by design even when added as exception), at least now it does work after a reboot.
The issue I had was that after several reboots, and adding exceptions, the "cert8.db" gets corrupted, and I had to restore the file from backup (or delete it), which stated being annoying...
A lot, or too much work only to see a "solid padlock", couldn't care less if it works without bugging me.After importing the cert file into Chrome, I get a solid padlock beside the URL when logging into my router. When I import the cert into Firefox, I get the same as you do. Now when I use Kvics script and import the certs into Chrome or Firefox I get a solid padlock on both. Green for Firefox when logging into my router.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!