https://www.snbforums.com/threads/a...rt-ac86u_3-0-0-4-384-32797.48520/#post-425767That will be up to Asus to fix.
Seems fix is included with this firmware ?
https://www.snbforums.com/threads/a...rt-ac86u_3-0-0-4-384-32797.48520/#post-425767That will be up to Asus to fix.
Well after nvram reset on the new version it works now. I always do this but hey it works now so no complaints.Is anyone having issues with the asus app on android. I haven't been able to get mine to find my router for a while. Any help would be greatly appreciated.
https://www.snbforums.com/threads/a...rt-ac86u_3-0-0-4-384-32797.48520/#post-425767
Seems fix is included with this firmware ?
@RMerlin, you're a busy guy. I really do appreciate all the efforts in making our routers 'GREAT' which is better than just good. Your FW makes that possible. I know the beta 3 is still in testing but normally from your experience, how long normally does it take to go final? Thanks again for all you do!!!!In that case it will happen when I merge 384_32797, which is currently scheduled for 384.8.
The final release of 384.7 is in the immediate future. My guess...this weekend. He wants to fully test the DDNS changes he made.@RMerlin, you're a busy guy. I really do appreciate all the efforts in making our routers 'GREAT' which is better than just good. Your FW makes that possible. I know the beta 3 is still in testing but normally from your experience, how long normally does it take to go final? Thanks again for all you do!!!!
@RMerlin, you're a busy guy. I really do appreciate all the efforts in making our routers 'GREAT' which is better than just good. Your FW makes that possible. I know the beta 3 is still in testing but normally from your experience, how long normally does it take to go final? Thanks again for all you do!!!!
Are you planning on adding the CERT config changes to the standard config?Hard to say for sure, there's one last minute update to dnsmasq that I want to apply due to a resolver issue it fixes, so that's delaying the release a bit.
Are you planning on adding the CERT config changes to the standard config?
EDIT: Nevermind...see you already did it
I'm just compiling with 2.80test7 and will give it a workout for a day or so as well.The cache fix however might possibly resolve some random resolution failures in his opinion. He's been testing it for a while, and will merge to my repo in the coming days, so I can also test it on my end.
afraid.org DDNS working fine. Update both wan and vpn1 ip-nummer with inadyn.conf.add.
Uptime 1 days 11 hours 36 minute(s) 1 seconds
My question @RMerlin why you are using a snapshot and unstable version of dnsmasq and knowing that version 2.79 is stable?, why not remove that alpha version and add the stable version 2.79?
version 2.80
Add support for RFC 4039 DHCP rapid commit. Thanks to Ashram Method
for the initial patch and motivation.
Alter the default for dnssec-check-unsigned. Versions of
dnsmasq prior to 2.80 defaulted to not checking unsigned
replies, and used --dnssec-check-unsigned to switch
this on. Such configurations will continue to work as before,
but those which used the default of no checking will need to be
altered to explicitly select no checking. The new default is
because switching off checking for unsigned replies is
inherently dangerous. Not only does it open the possiblity of forged
replies, but it allows everything to appear to be working even
when the upstream namesevers do not support DNSSEC, and in this
case no DNSSEC validation at all is occuring.
Fix DHCP broken-ness when --no-ping AND --dhcp-sequential-ip
are set. Thanks to Daniel Miess for help with this.
Add a facilty to store DNS packets sent/recieved in a
pcap-format file for later debugging. The file location
is given by the --dumpfile option, and a bitmap controlling
which packets should be dumped is given by the --dumpmask
option.
Handle the case of both standard and constructed dhcp-ranges on the
same interface better. We don't now contruct a dhcp-range if there's
already one specified. This allows the specified interface to
have different parameters and avoids advertising the same
prefix twice. Thanks to Luis Marsano for spotting this case.
Allow zone transfer in authoritative mode if auth-peer is specified,
even if auth-sec-servers is not. Thanks to Raphaël Halimi for
the suggestion.
Fix bug which sometimes caused dnsmasq to wrongly return answers
without DNSSEC RRs to queries with the do-bit set, but only when
DNSSEC validation was not enabled.
Thanks to Petr Menšík for spotting this.
Fix missing fatal errors with some malformed options
(server, local, address, rebind-domain-ok, ipset, alias).
Thanks to Eugene Lozovoy for spotting the problem.
Fix crash on startup with a --synth-domain which has no prefix.
Introduced in 2.79. Thanks to Andreas Engel for the bug report.
Fix missing EDNS0 section in some replies generated by local
DNS configuration which confused systemd-resolvd. Thanks to
Steve Dodd for characterising the problem.
Add --dhcp-name-match config option.
Add --caa-record config option.
Implement --address=/example.com/# as (more efficient) syntactic
sugar for --address=/example.com/0.0.0.0 and
--address=/example.com/::
Returning null addresses is a useful technique for ad-blocking.
Thanks to Peter Russell for the suggestion.
Change anti cache-snooping behaviour with queries with the
recursion-desired bit unset. Instead to returning SERVFAIL, we
now always forward, and never answer from the cache. This
allows "dig +trace" command to work.
Include in the example config file a formulation which
stops DHCP clients from claiming the DNS name "wpad".
This is a fix for the CERT Vulnerability VU#598349.
2.79 was not stable, not caching reliably, so it was skipped.why not remove that alpha version and add the stable version 2.79?
When use second inadyn with "conf.add" there is no cached 2:nd ip in "ddns.cache"
I update with 2:nd with: "checkip-command = "/usr/sbin/nvram get vpn_client1_rip"
My question @RMerlin why you are using a snapshot and unstable version of dnsmasq and knowing that version 2.79 is stable?, why not remove that alpha version and add the stable version 2.79?
I think the culprit is dnsmasq.
My mistake, I don't have inadyn.cache in /tmp. When is't created?This is normal. ddns.cache is only used by the firmware itself, not by inadyn. Inadyn has its own cache in /tmp/inadyn.cache for determining if an IP needs to be updated or not.
I discovered what looks like a bug in 384.7_beta3 on my 86u (also existed in previous versions I think, but didn't pin it down until after installing beta3). I normally keep hw acceleration 'runner' enabled, and the webui tools menu shows it as enabled. However if just click on the webui 'adaptive qos' tab on the left (not actually changing any settings there), runner becomes disabled. I am aware that enabling adaptive qos is incompatible with runner, however I think simply reading the qos page(s) and not changing any settings should not trigger a runner disable. Runner should not be disabled until an incompatible setting is actually applied. When this happens to me, rebooting the router re-enables runner.
Is anyone else having this problem? Not sure if it's something that can be fixed, or if it's locked inside a closed source blob.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!