thelonelycoder
Part of the Furniture
So that could be left out. Let me run some tests.I think I had the ipv4 rule for almost a year now, never see any hit in the Forward rule too.
So that could be left out. Let me run some tests.I think I had the ipv4 rule for almost a year now, never see any hit in the Forward rule too.
It would really depend on whether dnsmasq is advertising the router IP or not for DNS server, but if you’re using Diversion that could be a very safe assumption.So that could be left out. Let me run some tests.
So, leave it in or not?It would really depend on whether dnsmasq is advertising the router IP or not for DNS server, but if you’re using Diversion that could be a very safe assumption.
You could activate the log level for pixelserv-tls if you're interested in what domains fail, and from which client.Question folks i've notice as of late i'm getting a high slu count in Pixel serv where I have the ca.crt installed on my main browser on my desktop, also on my Cell phone and all other laptops in the network. However this still seems to be high any suggestions?
No iOS devices on my network except for when the woman is over with her Iphone and that device is not on the network currently.
View attachment 42660
Will give this a try thank you.You could activate the log level for pixelserv-tls if you're interested in what domains fail, and from which client.
In Diversion use ep, 2 and add the -l switch with log level 5 for debug. This prints a verbose log to the syslog.
Alternatively, you could start new with your auto-generated certs by going to ep, 3 and purge the domain certificates (option 1).
Traffic sent at the router (for instance from a client to dnsmasq) will go through the INPUT chain. FORWARD would be traffic leaving your LAN to go to the Internet.I'm seeing that the FORWARD rule is never hit, only the INPUT. If I let my iOS army loose I get for example 32000 packets to the INPUT chain while FORWARD has 0.
Just an observation.
Ok, the “input” grep counts & increases.I able to add these two rules for ipv6. In my environment, all hits happen at INPUT table for both ipv4 and ipv6.
Code:ip6tables -I INPUT -p udp --dport 53 -d $(nvram get ipv6_rtr_addr) -m string --hex-string "|0000410001|" --algo bm -j REJECT ip6tables -I FORWARD -p udp --dport 53 -m string --hex-string "|0000410001|" --algo bm -j REJECT
Perhaps @Treadler can help to test this in your ipv6 environment? Can use
to check if packet count increases when it hits the rules.Code:ip6tables -nvL INPUT | grep 'pkts\|0041' ip6tables -nvL FORWARD | grep 'pkts\|0041'
Yikes! You can get that at level 2, and keep it there without drowning.add the -l switch with log level 5 for debug
This is about where I am. Amazon Echos and Roku boxes account for the bulk of the rejected requests. Ever minute or so they seem to try a blocked query, and then retry it hundreds of times in the next few seconds.Question folks i've notice as of late i'm getting a high slu count in Pixel serv where I have the ca.crt installed on my main browser on my desktop, also on my Cell phone and all other laptops in the network. However this still seems to be high any suggestions?
No iOS devices on my network except for when the woman is over with her Iphone and that device is not on the network currently.
View attachment 42660
curl -Os https://diversion.ch/install && sh install |
'sh' is not recognized as an internal or external command, operable program or batch file.
Use another SSH terminal like Xshell that does not override the system path. This problem was introduced in Asuswrt-Merlin 386.7.Hi
Is it possible to remove this once it is installed and if so how involved is that process?
When I attempt to run the following command to install:
I get this error:
curl -Os https://diversion.ch/install && sh install
The command is being run from a windows command prompt w/admin rights. I am able to use the SSH command from this same prompt to access my mining rig for example without issue.
I assume I need to be running a separate terminal completely like putty to do this?
His problem is actually that he tried to run that in a Windows command prompt rather than on his router.Use another SSH terminal like Xshell that does not override the system path. This problem was introduced in Asuswrt-Merlin 386.7.
Why is there no Diversion version for Windows you ask?His problem is actually that he tried to run that in a Windows command prompt rather than on his router.
Jul 12 20:47:21 kernel: potentially unexpected fatal signal 11.
Jul 12 20:47:21 kernel: CPU: 1 PID: 19001 Comm: dcd Tainted: P O 4.1.51 #2
Jul 12 20:47:21 kernel: Hardware name: Broadcom-v8A (DT)
Jul 12 20:47:21 kernel: task: ffffffc02ff03500 ti: ffffffc027540000 task.ti: ffffffc027540000
Jul 12 20:47:21 kernel: PC is at 0x29d34
Jul 12 20:47:21 kernel: LR is at 0x29fb4
Jul 12 20:47:21 kernel: pc : [<0000000000029d34>] lr : [<0000000000029fb4>] pstate: 20070010
Jul 12 20:47:21 kernel: sp : 00000000ffedf880
Jul 12 20:47:21 kernel: x12: 00000000000a211c
Jul 12 20:47:21 kernel: x11: 0000000000081d64 x10: 0000000000000006
Jul 12 20:47:21 kernel: x9 : 0000000000000003 x8 : 0000000000000006
Jul 12 20:47:21 kernel: x7 : 00000000f5f00b14 x6 : 0000000000000035
Jul 12 20:47:21 kernel: x5 : 0000000000000049 x4 : 00000000f5f00b74
Jul 12 20:47:21 kernel: x3 : 0000000000000000 x2 : 0000000000000005
Jul 12 20:47:21 kernel: x1 : 000000000000000d x0 : 0000000000000000
Always thought that message was a consequence of using both Pixelserv + Aiprotect together (as I do).Does anyone know if the syslog msg below is related to Diversion? I saw a similar thread which was fixed by disabling pixerlserv but I don't use pixelserv. Thoughts?
Code:Jul 12 20:47:21 kernel: potentially unexpected fatal signal 11. Jul 12 20:47:21 kernel: CPU: 1 PID: 19001 Comm: dcd Tainted: P O 4.1.51 #2 Jul 12 20:47:21 kernel: Hardware name: Broadcom-v8A (DT) Jul 12 20:47:21 kernel: task: ffffffc02ff03500 ti: ffffffc027540000 task.ti: ffffffc027540000 Jul 12 20:47:21 kernel: PC is at 0x29d34 Jul 12 20:47:21 kernel: LR is at 0x29fb4 Jul 12 20:47:21 kernel: pc : [<0000000000029d34>] lr : [<0000000000029fb4>] pstate: 20070010 Jul 12 20:47:21 kernel: sp : 00000000ffedf880 Jul 12 20:47:21 kernel: x12: 00000000000a211c Jul 12 20:47:21 kernel: x11: 0000000000081d64 x10: 0000000000000006 Jul 12 20:47:21 kernel: x9 : 0000000000000003 x8 : 0000000000000006 Jul 12 20:47:21 kernel: x7 : 00000000f5f00b14 x6 : 0000000000000035 Jul 12 20:47:21 kernel: x5 : 0000000000000049 x4 : 00000000f5f00b74 Jul 12 20:47:21 kernel: x3 : 0000000000000000 x2 : 0000000000000005 Jul 12 20:47:21 kernel: x1 : 000000000000000d x0 : 0000000000000000
Anything that adds a virtual network interface will trigger that message. Pixelserv is just a popular addon that does.A puzzlement indeed!
Example Files
Of note, example files are placed in /opt/share/sylog-ng/examples/ and /opt/share/logrotate/examples/ for common programs (skynet, pixelserv-tls, etc). These can be copied directly to /opt/etc/syslog-ng.d/ and /opt/etc/logrotate.d/ for use. Do not blindly copy all of these files to their respective ".d" directories however, as doing so will prevent syslog-ng from running. Editing files directly here is not recommended as they will likely be overwritten if you choose to update the filters.
/.../entware/share/syslog-ng/examples/crash
/.../entware/share/logrotate/examples/crash
chmod 0600 /opt/etc/syslog-ng.d/pixelserv
chmod 0600 /opt/etc/logrotate.d/pixelserv
FWIW, the type 65 blocking doesn’t (yet) work over IPv6.I have been using diversion for years and it blocked millions of ads. Many pages had holes in them where ads used to be.
However, I have noticed lately even when using 4.3.1 those holes are filled with ads again. I have type 65 blocking enabled. If I look at the source of those ads on Microsoft Edge, they appear to come from aka.ads-ms.co which is in the blocking list I use. They seem to be put on the page after all the real information has been displayed. There seems to be something that is allowing those ads that is not controlled by diversion. I don't see any posts that have noted this difficulty with diversion.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!