I think I see the problem.....the wget '.gitignore' can sometimes be too aggressive (I seem to remember I had a similar problem once before).i also have it both + the error
This one....Or does it mean I can only set up 2 external VPN connections using the N66U as a client (NordVPN and Hide My butt)
[01:38:52.197584] STUBBY: 1.1.1.1
[01:52:23.024072] STUBBY: 9.9.9.9
[01:52:35.780419] STUBBY: 1.1.1.1
[01:55:25.336285] STUBBY: 9.9.9.9
[01:56:26.115771] STUBBY: 1.1.1.1
[01:57:26.615280] STUBBY: 9.9.9.9
[01:58:27.636661] STUBBY: 1.1.1.1
[01:59:39.202977] STUBBY: 9.9.9.9
[02:00:28.649195] STUBBY: 1.1.1.1
[02:01:29.290540] STUBBY: 9.9.9.9
[02:01:46.600614] STUBBY: 1.1.1.1
[02:02:30.082404] STUBBY: 9.9.9.9
[02:03:31.121325] STUBBY: 1.1.1.1
[02:03:51.926897] STUBBY: 9.9.9.9
[02:04:02.198679] STUBBY: 1.1.1.1
[02:05:32.135952] STUBBY: 9.9.9.9
[02:06:04.414373] STUBBY: 1.1.1.1
[02:06:32.882305] STUBBY: 9.9.9.9
[02:07:12.083805] STUBBY: 1.1.1.1
[02:07:33.708513] STUBBY: 9.9.9.9
[02:07:47.957283] STUBBY: 1.1.1.1
[02:08:34.254872] STUBBY: 9.9.9.9
[02:08:56.372612] STUBBY: 1.1.1.1
[02:09:34.813955] STUBBY: 9.9.9.9
[02:10:35.344851] STUBBY: 1.1.1.1
[02:11:35.847573] STUBBY: 9.9.9.9
[02:12:36.402346] STUBBY: 1.1.1.1
[02:13:52.656686] STUBBY: 9.9.9.9
[02:14:00.144435] STUBBY: 1.1.1.1
[02:15:38.139040] STUBBY: 9.9.9.9
[02:15:51.510883] STUBBY: 1.1.1.1
[02:17:39.578990] STUBBY: 9.9.9.9
[02:18:54.356181] STUBBY: 1.1.1.1
[02:19:36.694177] STUBBY: 9.9.9.9
[02:19:40.657891] STUBBY: 1.1.1.1
[02:20:09.952705] STUBBY: 9.9.9.9
[02:20:29.381667] STUBBY: 1.1.1.1
[02:24:43.910463] STUBBY: 9.9.9.9
[02:25:44.447161] STUBBY: 1.1.1.1
[02:26:05.798615] STUBBY: 9.9.9.9
[02:26:45.084328] STUBBY: 1.1.1.1
[02:31:46.620219] STUBBY: 9.9.9.9
[02:32:48.421845] STUBBY: 1.1.1.1
[02:33:13.472051] STUBBY: 9.9.9.9
[02:33:44.276246] STUBBY: 1.1.1.1
[02:34:38.879518] STUBBY: 9.9.9.9
[02:34:49.372601] STUBBY: 1.1.1.1
[02:35:49.879465] STUBBY: 9.9.9.9
[02:36:44.703579] STUBBY: 1.1.1.1
[02:39:41.985290] STUBBY: 9.9.9.9
[02:39:52.418790] STUBBY: 1.1.1.1
[02:41:57.243103] STUBBY: 9.9.9.9
[03:10:56.022503] STUBBY: 1.1.1.1
[03:32:30.592013] STUBBY: 9.9.9.9
[03:33:21.198951] STUBBY: 1.1.1.1
[03:36:16.773655] STUBBY: 9.9.9.9
[03:37:08.115546] STUBBY: 1.1.1.1
[03:39:00.807132] STUBBY: 9.9.9.9
[03:40:31.608426] STUBBY: 1.1.1.1
[03:47:48.155957] STUBBY: 9.9.9.9
[03:48:39.819292] STUBBY: 1.1.1.1
[03:50:17.019438] STUBBY: 9.9.9.9
[03:52:33.522719] STUBBY: 1.1.1.1
[03:54:01.500790] STUBBY: 9.9.9.9
[03:54:37.720206] STUBBY: 1.1.1.1
[03:57:14.819936] STUBBY: 9.9.9.9
[03:57:23.259641] STUBBY: 1.1.1.1
[03:58:03.502286] STUBBY: 9.9.9.9
[03:58:55.755527] STUBBY: 1.1.1.1
[03:59:13.537348] STUBBY: 9.9.9.9
[04:02:20.900235] STUBBY: 1.1.1.1
[04:02:36.451450] STUBBY: 9.9.9.9
[04:03:43.780949] STUBBY: 1.1.1.1
[04:06:41.657506] STUBBY: 9.9.9.9
[04:07:00.031230] STUBBY: 1.1.1.1
[04:09:02.734906] STUBBY: 9.9.9.9
[04:10:22.687763] STUBBY: 1.1.1.1
[04:10:54.576168] STUBBY: 9.9.9.9
[05:53:24.713946] STUBBY: 1.1.1.1 : Conn opened: TLS - Strict Profile
[05:53:24.780361] STUBBY: 1.1.1.1 : Verify passed : TLS
[05:53:34.803096] STUBBY: 1.1.1.1 : Conn closed: TLS - Resps= 2, Timeouts = 0, Curr_auth =Success, Keepalive(ms)= 10000
[05:53:34.803361] STUBBY: 1.1.1.1 : Upstream : TLS - Resps= 566, Timeouts = 0, Best_auth =Success
[05:53:34.803487] STUBBY: 1.1.1.1 : Upstream : TLS - Conns= 168, Conn_fails= 0, Conn_shuts= 153, Backoffs = 0
[05:53:57.865446] STUBBY: 9.9.9.9 : Conn opened: TLS - Strict Profile
[05:53:57.943101] STUBBY: 9.9.9.9 : Verify passed : TLS
[05:54:03.400948] STUBBY: 9.9.9.9 : Conn closed: TLS - Resps= 8, Timeouts = 0, Curr_auth =Success, Keepalive(ms)= 10000
[05:54:03.401211] STUBBY: 9.9.9.9 : Upstream : TLS - Resps= 367, Timeouts = 0, Best_auth =Success
[05:54:03.401339] STUBBY: 9.9.9.9 : Upstream : TLS - Conns= 112, Conn_fails= 0, Conn_shuts= 112, Backoffs = 0
[05:54:04.070813] STUBBY: 9.9.9.9 : Conn opened: TLS - Strict Profile
[05:54:04.143022] STUBBY: 9.9.9.9 : Verify passed : TLS
I am not using DNSSEC.Do not use Strict DNSSEC some regions where Cloudflare has its DNS servers does not work with Strict DNSSEC.
Perfect. ThanksThis one....
(You may have read it in the first post 'Additional Information' section. I added it with the last release based on some questions in this thread).
EDIT: For the server, the number of clients is set by the VPN subnet/mask....default is 256 although I wouldn't recommend trying that many
I thought about round robin but I would expect it to swap one for one, or maybe I'm assuming too much. Round robin is not set AFAICT:@ColinTaylor
It looks like you are really in Roundrobin mode (The Backoff counter is the number of times it was forced to try an alternate server, and yours are both zero).
Can you double check the round_robin_upstreams parm in /etc/stubby.yml ?
# cat /etc/stubby.yml
tls_ca_file: "/rom/ca-bundle.crt"
resolution_type: GETDNS_RESOLUTION_STUB
dns_transport_list:
- GETDNS_TRANSPORT_TLS
tls_authentication: GETDNS_AUTHENTICATION_REQUIRED
tls_query_padding_blocksize: 256
edns_client_subnet_private: 1
round_robin_upstreams: 0
idle_timeout: 10000
tls_backoff_time: 900
appdata_dir: "/var/tmp/stubby"
listen_addresses:
- 127.0.0.1@5453
upstream_recursive_servers:
# Quad 9 Secure Primary
- address_data: 9.9.9.9
tls_auth_name: "dns.quad9.net"
# Cloudflare Primary
- address_data: 1.1.1.1
tls_auth_name: "cloudflare-dns.com"
Yes, the switching does seem to be a bit quirky as I've been looking at it. It appears as if once it switches due to an error, it doesn't switch again until the another error occurs.The problem is there's no consistency to it. I started stubby an hour ago, it switched 8 times in the first 7 minutes. Since then (50 minutes) it's been stubbornly stuck on 1.1.1.1 without changing.
I've not found that (or maybe it's random). But the stubby I'm currently running definitely connected to 9.9.9.9 first.I didn't notice it before, but it also seems that the server list in the yml file should also be in 'reverse' order (last entry is the primary, not the first).
# cat /var/tmp/stubby/stubby.log
[00:08:00.389157] STUBBY: Read config from file /etc/stubby.yml
[00:08:06.692468] STUBBY: 9.9.9.9 : Conn opened: TLS - Strict Profile
[00:08:06.770988] STUBBY: 9.9.9.9 : Verify passed : TLS
[00:08:09.931502] STUBBY: 9.9.9.9 : Conn closed: TLS - Resps= 19, Timeouts = 0, Curr_auth =Success, Keepalive(ms)= 10000
[00:08:09.931764] STUBBY: 9.9.9.9 : Upstream : TLS - Resps= 19, Timeouts = 0, Best_auth =Success
[00:08:09.931891] STUBBY: 9.9.9.9 : Upstream : TLS - Conns= 1, Conn_fails= 0, Conn_shuts= 1, Backoffs = 0
Yes, it connected in order (it looks like to test each defined server)...but then it settled on the last one.I've not found that (or maybe it's random). But the stubby I'm currently running definitely connected to 9.9.9.9 first.
different errors but still wget is the issueI think I see the problem.....the wget '.gitignore' can sometimes be too aggressive (I seem to remember I had a similar problem once before).
I pushed an update to the repro....do a git pull and see if it's fixed.
I have a slightly different setup (I don't use individual client certs), but I just connected/disconnected several times in a row without a problem. There was no change in the VPN server between 33E7 and 34E3. I doubt that dnsmasq is playing into it.
One thing you might try since you are running an N66. Backup your jffs on 33E7. Then when you move to 34E3, reformat your jffs space and restore the backup from 33E7. (The jffs space on the N66 is allocated from space leftover after the firmware is loaded and a change in the firmware size can corrupt jffs).
openvpn[615]: <!-- external client IP -->:42821 TLS: Initial packet from [AF_INET]<!-- external client IP -->:42821, sid=11d18898 1c86f353
openvpn[615]: <!-- external client IP -->:42821 VERIFY OK: depth=1, <!--CA DN-->
openvpn[615]: <!-- external client IP -->:42821 VERIFY OK: depth=0, CN=client1
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_VER=2.5_master
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_PLAT=android
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_PROTO=2
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_NCP=2
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_LZ4=1
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_LZ4v2=1
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_LZO=1
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_COMP_STUB=1
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_COMP_STUBv2=1
openvpn[615]: <!-- external client IP -->:42821 peer info: IV_TCPNL=1
daemon
topology subnet
server 192.168.10.0 255.255.255.0
local <!--external server ip-->
proto udp
port 4317
dev tun21
ncp-ciphers AES-128-GCM:AES-256-GCM:AES-128-CBC:AES-256-CBC
cipher AES-256-CBC
auth SHA256
comp-lzo adaptive
keepalive 15 60
verb 3
push "route 192.168.0.0 255.255.255.0"
duplicate-cn
push "redirect-gateway def1"
plugin /usr/lib/openvpn-plugin-auth-pam.so openvpn
duplicate-cn
ca ca.crt
dh dh.pem
cert server.crt
key server.key
status-version 2
status status 10
push "dhcp-option DNS 192.168.0.35"
round_robin_upstreams 0 or 1
If 1, round robin queries across all the configured upstream servers. Without this option stubby will use each upstream server sequentially until it becomes unavailable and then move on to use the next.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!