What's new

Asuswrt-Merlin 380.57 is now available

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Can confirm this is also the case with my RT-AC68U. Switching to legacy b/g results in receiving DHCP information, switching back to AUTO or N does not. Leaving it on legacy for now.

Same problem with only one of my RT-N66U running 380.57. The four other APs don't have the same issue. The only differnce is this one AP has a SSID that is 18 characters long (all the others are 15 characters or shorter). Not sure if that makes a difference.
 
Hi,

This version is working just perfect. The only thing that is causing my trouble is the syslog flooded with DHCP transactions.
Any command I can run to take DHCP's transactions from the syslog?

Thanks,

pcQVTh9.png
 
Any command I can run to take DHCP's transactions from the syslog?
There is an option to disable the DHCP logging. On the latest Merlin, I think it's under LAN>DHCP Servers (on my fork, it's under Administration>System, in the Syslog section).
 
Under Lan Section , did you check "HIDE RA"
No, I have just did it after you mentioned it. Thanks

Sent from Galaxy S6 w/ Tapatalk
 
Brand new AC68U router out of the box , flash to merlin 380_57 . Did factory reset and 30/30/30 .
I noticed : 2.4ghz when set to channel 1-10 , no clients can connect with error that password is wrong .
Setting 2.4ghz to channel 11 works , clients can connect .

After a few days on this firmware , i can't login to the management page anymore , as it gives me a blank page (tried chrome , IE , Firefox) :
http://192.168.1.1/Main_Login.asp?error_status=1&page=index.asp&lock_time=0

Logging in to SSH i get -sh: can't fork messages :

ASUSWRT-Merlin RT-AC68U_3.0.0.4 Thu Dec 24 18:54:10 UTC 2015
-sh: can't fork
admin@RT-AC68U-8910:/tmp/home/root# dmesg
-sh: can't fork
admin@RT-AC68U-8910:/tmp/home/root# reboot
-sh: can't fork
admin@RT-AC68U-8910:/tmp/home/root# ls
-sh: can't fork
admin@RT-AC68U-8910:/tmp/home/root# cd /
admin@RT-AC68U-8910:/# ls
-sh: can't fork



Bit strange and i don't know how to fix it , never had much issues before on Merlin's releases .
Other people having this too ? Any tips ?


I can also mention I have another AC68U , running 380_57 which was upgraded from an earlier Merlin release with NO factory reset which is running fine .

EDIT :
After being logged in to the SSH for a few hours suddenly i can input commands again . Also the webpage is available again . The router did not reboot .

admin@RT-AC68U-8910:/tmp/home/root# cd /
admin@RT-AC68U-8910:/# ls
-sh: can't fork
admin@RT-AC68U-8910:/# free
-sh: can't fork
admin@RT-AC68U-8910:/# top
-sh: can't fork
admin@RT-AC68U-8910:/# df
-sh: can't fork
admin@RT-AC68U-8910:/# df
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/root 28800 28800 0 100% /
devtmpfs 127752 0 127752 0% /dev
tmpfs 127856 960 126896 1% /tmp
/dev/mtdblock4 64256 1752 62504 3% /jffs
admin@RT-AC68U-8910:/# free
total used free shared buffers
Mem: 255716 144680 111036 0 272
-/+ buffers: 144408 111308
Swap: 0 0 0
admin@RT-AC68U-8910:/# uptime
12:21:47 up 12 days, 2:17, load average: 0.00, 0.01, 0.04

dmesg output :
Code:
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 783 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 801 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 190 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 802 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 804 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 74 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 807 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 651 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 772 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 525 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 771 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 795 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 812 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 769 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 785 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 803 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
net_ratelimit: 752 callbacks suppressed
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
TCP: time wait bucket table overflow
 
Last edited:
30/30/30 is not the way to Hard reset an Asus Router
Factory to Default in the GUI(administration) or WPS button trick(search on this forum) or "reset" button 10 sec to clear nvram
Knowed issues you have with this latest firmware for the AC 68
Read this treadh from the beginning
Revert back to 378.56_2 is the solution til a fix from asus
 
I can corroborate - With 380.57 - my 2.4Ghz clients were bobbing up and down - connecting, with no Internet access, going down, coming up with Auth Failure, going down, indefinitely.

Downgraded to 378.56_2 - seems stable for now. Now I have to inform other device folks who I mislead to look at their devices for problems!!
\eYeks
 
Thank you all for the advice !

I did reset to factory defaults though (through webinterface. The 30/30/30 i did is just a habit i have from my DD-wrt routers ) , but that's clearly not where the main problem is in this case .
 
I can corroborate - With 380.57 - my 2.4Ghz clients were bobbing up and down - connecting, with no Internet access, going down, coming up with Auth Failure, going down, indefinitely.

Downgraded to 378.56_2 - seems stable for now. Now I have to inform other device folks who I mislead to look at their devices for problems!!
\eYeks
On which router model? :rolleyes:
 
Have a problem on RT-AC68u, firmware 380.57. If I default the firmware, go immediately to the Tools -> Other Settings page, change traffic history to custom, enter path via the Select button (which turns out to be /mnt/ASUS/, a USB thumb drive which I used on previous Merlin firmwares, select create or reset data files, and, enable IP traffic (per IP), then save, it saves, and then the router crashes or something as you can never access it again, wired, wireless, ping, whatever. Did this 8 or 9 times until I figured out if I do not enable per IP monitoring, it works fine! I like using per IP, but, obviously, I won't enable it for now. Used to work.
 
Have a problem on RT-AC68u, firmware 380.57. If I default the firmware, go immediately to the Tools -> Other Settings page, change traffic history to custom, enter path via the Select button (which turns out to be /mnt/ASUS/, a USB thumb drive which I used on previous Merlin firmwares, select create or reset data files, and, enable IP traffic (per IP), then save, it saves, and then the router crashes or something as you can never access it again, wired, wireless, ping, whatever. Did this 8 or 9 times until I figured out if I do not enable per IP monitoring, it works fine! I like using per IP, but, obviously, I won't enable it for now. Used to work.

There's about a dozen posts regarding this on the forums already. Anything that causes NAT acceleration to be disabled on the RT-AC68U with firmware 380.57 will create issues - you have to fall back to 378.56_2.
 
Ok, can do, though, it's otherwise working. I actually searched for quite some time looking for anything to do with traffic history and never found such a thread. Must have missed a key word.
 
In chain SECURITY is double lined two times in Firewall.c
First place:
https://github.com/RMerl/asuswrt-merlin/blob/master/release/src/router/rc/firewall.c#L2895
Second place:
https://github.com/RMerl/asuswrt-merlin/blob/master/release/src/router/rc/firewall.c#L3904
Chain SECURITY (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN tcp -- any any anywhere anywhere tcpflags: FIN,SYN,RST,ACK/SYN limit: avg 1/sec burst 5
0 0 DROP tcp -- any any anywhere anywhere tcpflags: FIN,SYN,RST,ACK/SYN
0 0 RETURN tcp -- any any anywhere anywhere tcpflags: FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5
0 0 DROP tcp -- any any anywhere anywhere tcpflags: FIN,SYN,RST,ACK/RST
0 0 RETURN icmp -- any any anywhere anywhere icmp echo-request limit: avg 1/sec burst 5
0 0 DROP icmp -- any any anywhere anywhere icmp echo-request
0 0 RETURN all -- any any anywhere anywhere
 
In chain SECURITY is double lined two times in Firewall.c
If you look, you'll see every firewall rule is 'doubled'.....one in function filter_setting, and one in filter_setting2

Are you running dual wan?
 
If you look, you'll see every firewall rule is 'doubled'.....one in function filter_setting, and one in filter_setting2
Are you running dual wan?

No I'm using single WAN. Security chain have only been there for 2-3 fw back asus have changed that lately.
0 0 SECURITY all -- vlan11 any anywhere anywhere
 
Other than the cpu usage reporting issue, are there any known problems or precautions to upgrade an RT-N66U from 378.51 to 380.57?
 

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!

Staff online

Top