Asuswrt-Merlin 384.11 Beta is now available for all supported models. This release features a number of significant changes.
EDIT: RT-AC87U and RT-AC3100 beta 1 builds were pulled, as the images seem to suffer from the same corruption issues that recently affected Asus's own RT-AC68U 384_45708 release.
EDIT 2: All potentially affected models have been rebuilt. Please upgrade to the beta1b builds. AC86U/AX88U don't need it.
The highlights:
- New DNS Privacy feature, with DNS-over-TLS support. Configurable under WAN -> Internet Connection, this feature lets you connect with DNS servers that support DNS-over-TLS (DoT). DoT allows your DNS queries to be encrypted, preventing snooping from your ISP or anyone else in transit. Please visit https://dnsprivacy.org/wiki/ for more info on this protocol.
- Replaced the custom ntpclient with an ntp daemon. This daemon acts as a client (to sync your router's clock with the NTP servers configured on the router's System -> Administration page), but it can also be used as an ntp server for your LAN devices. Server functionality can be enabled on the System Administration page. Afterward, you can configure your LAN clients to use your router's IP as their NTP server.
- GPL merges: 384_5951 (RT-AX88U), 384_45713 (all other models). Note that the RT-AC87U and RT-AC3200 are still using the 384_45149 binary blobs for their closed source components.
- Component updates: nano (4.0), curl (7.64.1), dropbear (2019.78).
- Reworked the Firmware Upgrade page. The option to enable/disable automated checks are now on that page, and support for the Beta channel has been removed. Also, the popup reporting a new firmware release will now display that new firmware's version.
- Cleanups to the DDNS page (removed the annoying alert() popups, and moved the notification within the page itself)
- Moved some DNS settings (like DNSSEC) from the DHCP to the Internet Connection page
- Moved LED control to the System -> Administration page
- Editing devices on the Network Map will no longer restart your entire network, only dnsmasq itself. It means that blocking Internet access through it might not immediately come into effect, however the previous behaviour made it impossible to edit multiple clients.
- Custom config/script changes: added service-event-end (run at the end of an rc service event, same parameter as service-event), stubby.postconf/add support (for customizing the DNS Privacy configuration). pre-mount will now receive the filesystem as a second argument.
- Reboot Scheduler should be more reliable and less likely to corrupt plugged USB disks now
- Security issue CVE-2019-1543 resolved in OpenSSL 1.1.x
Please see the Changelog for the complete list of changes.
DNS Privacy:
To configure, simply go to the WAN -> Internet Connection page. Set DNS Privacy protocol to "DNS-over-TLS". Then select at least one server from the Preset drop-down to populate the fields below it, then click on the + button to add the server to the list. You can add multiple servers if needed, but two servers is generally sufficient. There are help popups available on most settings, by clicking on the label.
You can also manually add any desired server if it's not listed in the Presets (only some of the most popular ones are listed, as to keep the list to a manageable length).
DNS Privacy acts by replacing your WAN DNS servers on the router with those configured in the DNS-over-TLS server list. If you have OpenVPN Client set to enforce the use of the VPN server's DNS (Exclusive DNS mode on the VPN config page), or if you have LAN devices set to use a specific DNS server through DNSFilter, these will still go through their enforced server just like before. If you want to force client devices to use the DoT servers, then use DNSFilter in "Router" mode (either globally, or on a per client basis).
DNSSEC is fully supported as before, however note that due to a problem with Cloudflare's test method, their test sites will report failure when DNSSEC is enabled. This is because their test URLs refer to subdomains that are not properly DNSSEC signed, and the router's DNSSEC validation rejects them as invalid, which causes the test to fail. The only real way (known at this time) to fully test things is to use packet monitoring using something like tcpdump on your router (installable through Entware).
Things to test:
- DNS-over-TLS in general. Make sure you read the notes above first!
- NTP, NTPD, and the clock behaviour in general
Please keep discussions in this thread on this specific beta release.
Downloads are
here.
Changelog is
here.