Is there a know way already to install your firmware when firmware .380 or higher is installed?
The instructions are in the first post of this thread.
Is there a know way already to install your firmware when firmware .380 or higher is installed?
Omg.. sorry for that! Heading back to the first post. Thanks!The instructions are in the first post of this thread.
The router seemed up and running but was not reachable for 20 minutes or so... I resisted not to unplug the power...
No need to update the AC66 CFE....it's fine.Where can I get the CFE update file for the AC66?. It's not in the CFE folder in onedrive. Just the 56 and 68u are there.
My version is
Bootloader (CFE) 1.0.1.4
My AC68 is at 1.0.2.0 Is that what my 66U should be?
So my 66 has the latest it looks like.
I see 1.0.2.5 for the 68. Is my 1.0.2.0 good enough? I don't want mess with it if I don't have to.
dhcp-script=/usr/sbin/v6hosts.sh
addn-hosts=/_etc/hosts.autov6 (remove the underscore, Cloudfare doesn't like specifying that directory)
b18f366b63bc08ea584fda817af36533b157fdd5851e5ea97a615da3eecbe52e RT-AC68U_3.0.0.4_374.43_2-23B8j9527.trx
086c7b742522cbb09d20ef49322447cb3b38f1b131c92a792294ae6d261ae66b RT-AC56U_3.0.0.4_374.43_2-23B8j9527.trx
2baab973baafaa5ea259279cf0591647ea6d305eb81b9e0be341e630810d44b2 RT-N16_3.0.0.4_374.43_2-23B8j9527.trx
f7044dc4cfa154974bb4319e5b72efa2dd6f381b4d6780040aff9ff4b6c06c8e RT-AC66U_3.0.0.4_374.43_2-23B8j9527.trx
d2be254025169cf542ec63eb49db2c376403232c09d322ba1fb5b4f2ee3a3a48 RT-N66U_3.0.0.4_374.43_2-23B8j9527.trx
I don't believe so. The router itself is in a separate tc class (you wouldn't believe how slow the gui is if it participates)Hi @john9527, how are you? I have a couple comments this time:
QoS question here: Do the rules apply to traffic originated in the router itself? let's say (hypothetically speaking here Mr. NSA) someone has a torrent client running on the router; would that traffic be subject to the QoS rules?
Changing any of the dnscrypt options does a full restart of the WAN, so couldn't have been saved by the router. Most likely there was something cached in either your browser or the client dns cache.I have just changed my dnscrypt resolvers (already activated) and a bunch of services were restarted but for some reason dnsleaktest.com still stated my prior dnscrypt resolvers were being used, until I issued a "service restart_dnscrypt" and tried again
Will have to find some time to dig in and try and follow what you are saying.I was looking at openvpn.c and if I understood correctly, for a client, when cryptMode=TLS the client.ovpn file only has "up" and "down" scripts depending on the selection on the DNS field (line 280). While that might make sense, updown.sh is responsible for calling openvpn-event and in cases where it is not included in the client.ovpn file, then the openvpn-event script would not be executed. I know I could add a "up openvpn-event" line if I wanted to, but that will in turn prevent updown.sh from being executed at all since OpenVPN will only execute the last script. At the end of the day, it feels inconsistent; don't you think updown.sh should always be there even when it would only be invoking openvpn-event?
Yep...it's a bug. Looks like it was fixed in one of Merlin's ASUS merges, so it wasn't explicity called out.The cron job for the polling interval seems wrong, it executes "service vpnclient1 start" when it should execute "service start_vpnclient1"
Just the amount of change to implement it the way ASUS did and the fact it would then break the ability to move between the fork versions for VPN users. And I only support 2 each servers and clients, vs 2 servers and 5 clients for Merlin. And it's easy to implement manually....Is there a reason why vpn certs have not being mvoed from nvram to jffs as in Merlin? I know it probably happened after this fork, but I am just guessing why it did not follow along when it could be a huge nvram space save, right?
I haven't had any problems over the past couple of days, wouldn't you know. I did see the qos-init change in the syslog on boot. It wasn't exactly a major problem to begin with, but I'll keep an eye on it.FIXED: qos: handle case of qos trying to start before wan is up
Always the way.....as I said, I ultimately don't think that was the problem in your case, but I had already written the fix to cover that case, so left it included.I haven't had any problems over the past couple of days, wouldn't you know. I did see the qos-init change in the syslog on boot.
watchdog: restart httpd - SSL, error detected or process not responding (28)
Feb 2 23:01:14 rc_service: watchdog 443:notify_rc stop_httpd
Feb 2 23:01:14 rc_service: watchdog 443:notify_rc start_httpd
Feb 2 23:01:14 rc_service: waiting "stop_httpd" via watchdog ...
Feb 2 23:01:15 httpd: start httpd - SSL
That looks like a real error detection......the watchdog attempted to check that the router could respond over https and it never received a response after 10 sec. This can happen if you hit the right window trying to login from different clients at the same time. The good news is that this could lock up the https access, but this check will break it free.Hey John, getting the following messages with a frequency of every other day to twice in a day, allow only specified IP is off.
Code:watchdog: restart httpd - SSL, error detected or process not responding (28) Feb 2 23:01:14 rc_service: watchdog 443:notify_rc stop_httpd Feb 2 23:01:14 rc_service: watchdog 443:notify_rc start_httpd Feb 2 23:01:14 rc_service: waiting "stop_httpd" via watchdog ... Feb 2 23:01:15 httpd: start httpd - SSL
As noted earlier, similar messages with ssl disabled would only appear with allow only specified IP enabled and router's own IP not added to that list (which you fixed in the latest beta). Going to try the beta and see if it persists.
Are you using policy based routing? If so, try excluding the router ip from participating in the VPN (set it to WAN)Hi @john9527! I have updated to 23B8 and found out I had the same issue as in prior betas that was not happening in 22E4: whenever I start the OpenVPN client, the current wan line gets disconnected until I restart the firewall.
I have disabled all my custom ovpn config but still the issue persist (with a PIA standard config that would be). While the wan is detected down and the actual failover happens, I cannot get a ping reply from my wandog target (8.8.8.8) until I do a service restart_firewall.
Can that be related to the change you made to wandog to get the ping done from the specified interface?
Are you using policy based routing? If so, try excluding the router ip from participating in the VPN (set it to WAN)
That looks like a real error detection......the watchdog attempted to check that the router could respond over https and it never received a response after 10 sec. This can happen if you hit the right window trying to login from different clients at the same time. The good news is that this could lock up the https access, but this check will break it free.
Since you are redirecting all traffic....switch to policy rules with a rule that covers your entire subnet (192.168.1.1/24 for example), then add an exclude for the router address.No, redirecting all traffic. Weirdest thing is it starts working after restarting the firewall and I couldn’t see anything odd in the start_firewall function (22E4 at least, last source available)
I’m guessing either the wandog changes or some iptables rules that are misplaced when the VPN starts but get properly sorted out when restarting the firewall?
Another good news is I haven't yet seen this error on B8 yet. Will check again after a few days of uptime.
Something is hanging up https or keeping it too busy to respond. I use curl for the check, and the (28) is the curl return code which is a timeout. Just speculating, but do you have a lot of syslog activity going on (do you have packet logging on for example)?Nah got it after a few hours.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!