zeljko1234
New Around Here
Is it possible to block some sites, ads or similar with this firmware? Something like in this open-wrt topic: https://forum.openwrt.org/viewtopic.php?id=35023
Okay Voxel, I've loaded your new 23SF firmware over my original Netgear R7800 firmware and it started working fine for the most part.
It's been running for a couple of days with my original configuration. All the major functions I use are working solid and fine. Just one area I need to ask you about... the OpenVPN does not work for me any longer. I've tried using the standard version as well as your new v2.4.x setting for UDP and auto settings. My Android phone app which worked fine with the original Netgear firmware always connected immediately and fine. But I cannot get this 23F version to connect at all. Tried 2 different OpenVPN apps from Android playstore and they won't connect. Is there something else I need to do? Other than this quirk, I notice that the firmware does run quicker, the GUI pages appear more snappier than original firmware. So everything looks great for me except for the OpenVPN issue.
Is it possible to block some sites, ads or similar with this firmware? Something like in this open-wrt topic: https://forum.openwrt.org/viewtopic.php?id=35023
I am using the keys that are generated by the firmware. The android apps are using TUN UDP. I transfer the client smartphone.ovpn file to my Android phone and import it into the OpenVPN client app(s). But apps get failure to connect (some error messages say no TLS session found or something).I need more details: of course I’m using OpenVPN, both TAP and TUN. But I do not have Andriod gadgets unfortunately. I connect to my OpenVPN from two remote Windows computers and it's working.
Could you check what is in your OpenVPN server logs (/tmp/openvpn_log and /tmp/openvpn_tun_log)? What CA/CRT/KEY/DH are you using? I mean that I use my own CA/CRT/KEY/DH, not generated from FW. Do you use TAP or TUN? Did you install client configs downloaded from my FW or you used what was generated by stock FW, etc. Just more detailed info.
Voxel.
Hi, yes, I saw that in the openvpn script... I had just tried to copy over all the files to the /etc/openvpn/config directory and restarted openvpn.The problem is that, in Voxel firmware openvpn script configs files check in the /etc/openvpn/config. Your files, automatically generated in the /tmp/openvpn.
Solving the problem, edit the script or put your files in the /etc/openvpn/config.
root@R7800:/etc/openvpn/config$ cat client.ovpnShow your client.ovpn.
you have the port open?#dev-node NETGEAR-VPN
The port should be open as I am getting log entries of the Android client attempting to connect.Comment this line
you have the port open?
The port should be open as I am getting log entries of the Android client attempting to connect.
Question for the client.ovpn file... Does # character comment out the line or does the ; character comment out the line? or both can comment out lines? I tried commenting it out with # character but still no go.
I tried to reboot the router fresh with the changed settings and still no go.
But upon a reboot of the router the /tmp/openvpn_log does have one extra message saying " WARNING: Your certificate is not yet valid!".
Question: should the key and certificate files provided straight from Voxel's firmware install work or do I need to go through a procedure to regenerate all the keys? Apparently my keys are not validating properly between client and server. This needs to be corrected in the package I guess.
Here is the message I get in the /tmp/openvpn_tun_log when the Android client is trying to connect:
Sun Feb 19 18:08:24 2017 <my_ipaddress> TLS Error: TLS handshake failed
Sun Feb 19 18:08:24 2017 <my_ipaddress> SIGUSR1[soft,tls-error] received, client-instance restarting
Sun Feb 19 18:08:26 2017 <my_ipaddress> TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
I checked how it works my Ovpn, got the similar Error (Sun Feb 19 18:08:24 2017 <my_ipaddress> TLS Error: TLS handshake failed
Sun Feb 19 18:08:24 2017 <my_ipaddress> SIGUSR1[soft,tls-error] received, client-instance restarting
Sun Feb 19 18:08:26 2017 <my_ipaddress> TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
No, this is only for the router address (192.168.1.1) . All open ports for other addresses (192.168.1.100 - 192.168.1.150) work fine for me.So is that a trade off for using your modified firmware?
Okay Voxel. I just remembered that I had returned a R7000 router a couple of years ago because of Netgear's poor openvpn implementation which does not allow users to generate their own unique certificates and keys. A very huge and serious security exposure. I hope the updated openvpn mods you are putting in will allow us to secure this router much more securely and let us be able to generate our own unique config certificates and keys. There is talk on Netgear forums for the R7000 router about their poor openvpn. Some are wondering if every Netgear router is generating the same exact key for everyone so that anyone else with a Netgear certificate key can access anyone elses Netgear openvpn! Wow! if so what a security leak exposure! I hope your openvpn mods fix this security exposure otherwise Netgear routers are not good for openvpn use. turn it off then.OK, thanks for detailed info. Really, some problems with ca/crt/key/dh generated by firmware. I was able to reproduce. I do debug now. It is just FYI. Of course user should be able to use as own ca/crt/key/dh as generated by firmware. Bug. I need some time for fixing.
Voxel.
Well, as I wrote in my readme.docx that it is possible to use own CA/CRT/KEY/DH files for OpenVPN. I use my own files for OpenVPN (security reasons) so it is why I did not detect this problem with such files generated by firmware. It is enough to copy your own files to /etc/openvpn/config directory (or in /root/openvpn directory) and they will be used instead of generated by Netgear. Files mask should be:Okay Voxel. I just remembered that I had returned a R7000 router a couple of years ago because of Netgear's poor openvpn implementation which does not allow users to generate their own unique certificates and keys. A very huge and serious security exposure. I hope the updated openvpn mods you are putting in will allow us to secure this router much more securely and let us be able to generate our own unique config certificates and keys. There is talk on Netgear forums for the R7000 router about their poor openvpn. Some are wondering if every Netgear router is generating the same exact key for everyone so that anyone else with a Netgear certificate key can access anyone elses Netgear openvpn! Wow! if so what a security leak exposure! I hope your openvpn mods fix this security exposure otherwise Netgear routers are not good for openvpn use. turn it off then.
*ca.crt CA file
*.crt CERT file
*.key KEY file
dh*.pem DH file
root@R7800:/etc/openvpn/config$ cat client.ovpn
client
dev tap
proto udp
dev-node NETGEAR-VPN
remote <myWANipaddress> 12974
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca.crt
cert client.crt
key client.key
cipher AES-128-CBC
comp-lzo
;compress lz4-v2
verb 0
sndbuf 393216
rcvbuf 393216
Reminder: I am using tun not tap... ?
On my R7000 (with DD-WRT, new openvpn ver 2.4) I use:
proto udp4
this fixed the connection problem
Voxel,
I have been using your modified firmware and it has been very stable. I do have one question. I have been unable to setup any TCP/UDP port forwarding under the Advanced Setup section. I went back to your readme file and in section five it mentioned creating a text file for port forwarding. So is that a trade off for using your modified firmware?
Phantom
Okay Voxel, I've loaded your new 23SF firmware over my original Netgear R7800 firmware and it started working fine for the most part.
It's been running for a couple of days with my original configuration. All the major functions I use are working solid and fine. Just one area I need to ask you about... the OpenVPN does not work for me any longer. I've tried using the standard version as well as your new v2.4.x setting for UDP and auto settings. My Android phone app which worked fine with the original Netgear firmware always connected immediately and fine. But I cannot get this 23F version to connect at all. Tried 2 different OpenVPN apps from Android playstore and they won't connect. Is there something else I need to do? Other than this quirk, I notice that the firmware does run quicker, the GUI pages appear more snappier than original firmware. So everything looks great for me except for the OpenVPN issue.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!