john9527
Part of the Furniture
Depends on the provider and modem. I have a retail CM600 and you set your own password (not locked out in their firmware).And the cable companies are not fond of revealing those.
Depends on the provider and modem. I have a retail CM600 and you set your own password (not locked out in their firmware).And the cable companies are not fond of revealing those.
I used admin and password for my Arris 6190 initial access. It offered to change the password at that point for future use.And the cable companies are not fond of revealing those.
My TP-Link modem lets me set my own password as well.Depends on the provider and modem. I have a retail CM600 and you set your own password (not locked out in their firmware).
Spectrum (Charter) is tougher about this.Depends on the provider and modem. I have a retail CM600 and you set your own password (not locked out in their firmware).
Spectrum (Charter) is tougher about this.
If you would have used amtm to format the device, the ext file system selector would have only shown compatible choices for your router.When I try to add a USB flash drive formatted with ext4 to my RT-N16 the amtm program sw (create swap file) can't see it(ran the "Disk Utility" feature on the Asuswrt GUI and it does nothing).
When I reformatted with ext3 and run the "Disk Utility" i see this:
==============================================
Tue Apr 21 11:36:39 DST 2020
ASUS_RT_N16 contains a file system with errors, check forced.
ASUS_RT_N16: Inode 8 has EXTENTS_FL flag set on filesystem without extents support.
ASUS_RT_N16: UNEXPECTED INCONSISTENCY; RUN fsck MANUALLY.
(i.e., without -a or -p options)
===============================================
edit: ASUS_RT_N16 is the label I created for the USB flash drive.
the amtm sw script does see the usb flash and offers to create the 1/2 GB swap file (which I did)
My question: I'm guessing/remembering that ext4 is a fairly recent linux file system. That's why my NT-16 couldn't see it. Should I have tried using only the ext2 file system rather than the ext3?
If you would have used amtm to format the device, the ext file system selector would have only shown compatible choices for your router.
@Wallace_n_Gromit I would try this.
Done.
- Format the USB drive on a PC to NTFS
- Plug it in your RT-N16 and run amtm and the fd command.
opkg install tor tor-geoip bind-dig
modprobe ip_set
modprobe ip_set_hash_ip
modprobe ip_set_hash_net
modprobe ip_set_bitmap_ip
modprobe ip_set_list_set
modprobe xt_set
ipset create unblock hash:net
modprobe ip_set
modprobe ip_set_iphash
modprobe ip_set_nethash
modprobe ip_set_setlist
ip_set_bitmap_ip
xt_set
User@ASUS-RT-N66R:/tmp/home/root# ipset --create test hash:net
ipset v4.5: Couldn't load settype `hash:net':File not found
#!/bin/sh
### Custom user script
### Called after internal iptables reconfig (firewall update)
### Tor
iptables -t nat -A PREROUTING -i br0 -p tcp -m set --match-set unblock dst -j REDIRECT --to-port 9141
Generally I think ipset on MIPS routers like the N66 is older and cannot support the modules that ARM routers do.I'm trying to adapt a guide(it's on russian, sorry ) that was written for use with Padavan version of firmware. The main goal is to use TOR for unblocking resources blocked by provider listed in list-file.
The first problem is this script:
I found those modules in listCode:modprobe ip_set modprobe ip_set_hash_ip modprobe ip_set_hash_net modprobe ip_set_bitmap_ip modprobe ip_set_list_set modprobe xt_set ipset create unblock hash:net
But still can't find those 2:Code:modprobe ip_set modprobe ip_set_iphash modprobe ip_set_nethash modprobe ip_set_setlist
Modified command still give me error:Code:ip_set_bitmap_ip xt_set
The last thing is I need to add the script below after iptables reconfigCode:User@ASUS-RT-N66R:/tmp/home/root# ipset --create test hash:net ipset v4.5: Couldn't load settype `hash:net':File not found
And I don't know where to place it and is it correct for this environment.Code:#!/bin/sh ### Custom user script ### Called after internal iptables reconfig (firewall update) ### Tor iptables -t nat -A PREROUTING -i br0 -p tcp -m set --match-set unblock dst -j REDIRECT --to-port 9141
I just created file /jffs/scripts/services-start and placed all those commends there
Please, help me to figure it out.
I'm trying to adapt a guide(it's on russian, sorry ) that was written for use with Padavan version of firmware. The main goal is to use TOR for unblocking resources blocked by provider listed in list-file.
The first problem is this script:
I found those modules in listCode:modprobe ip_set modprobe ip_set_hash_ip modprobe ip_set_hash_net modprobe ip_set_bitmap_ip modprobe ip_set_list_set modprobe xt_set ipset create unblock hash:net
But still can't find those 2:Code:modprobe ip_set modprobe ip_set_iphash modprobe ip_set_nethash modprobe ip_set_setlist
Modified command still give me error:Code:ip_set_bitmap_ip xt_set
The last thing is I need to add the script below after iptables reconfigCode:User@ASUS-RT-N66R:/tmp/home/root# ipset --create test hash:net ipset v4.5: Couldn't load settype `hash:net':File not found
And I don't know where to place it and is it correct for this environment.Code:#!/bin/sh ### Custom user script ### Called after internal iptables reconfig (firewall update) ### Tor iptables -t nat -A PREROUTING -i br0 -p tcp -m set --match-set unblock dst -j REDIRECT --to-port 9141
I just created file /jffs/scripts/services-start and placed all those commends there
Please, help me to figure it out.
case $(ipset -v | grep -o "v[4,6]") in
v6) MODULES="ARM"; MATCHSET='--match-set'; LIST='list'; CREATE='create'; SAVE='save'; RESTORE='restore'; FLUSH='flush'; DESTROY='destroy'; ADD='add'; SWAP='swap'; TEST='test'; DELETE="del"
IPHASH='hash:ip'; NETHASH='hash:net'; PORTBITMAP="bitmap:port range 1-65535"; IPPORT=; SETNOTFOUND='name does not exist'; TIMEOUT='timeout'
lsmod | grep -q "xt_set" || for module in ip_set ip_set_hash_net ip_set_hash_ip xt_set
do modprobe $module; done;;
v4) MODULES="MIPS";MATCHSET='--set'; LIST='--list'; CREATE='--create'; SAVE='--save'; RESTORE='--restore'; FLUSH='--flush'; DESTROY='--destroy'; ADD='--add'; SWAP='--swap'; TEST='--test'; DELETE="--del"
IPHASH='iphash'; NETHASH='nethash'; PORTBITMAP="portmap --from 1 --to 65535"; IPPORT="ipporthash"; SETNOTFOUND='Unknown set'; TIMEOUT=; RETAIN_SECS=
lsmod | grep -q "ipt_set" || for module in ip_set ip_set_nethash ip_set_iphash ipt_set
do modprobe $module; done;;
*) logger -st "($(basename $0))" $$ "**ERROR** Unknown ipset version: $(ipset -v). Exiting." && (echo -e "\a";exit 99);;
esac
ipset $CREATE test $NETHASH
Generally I think ipset on MIPS routers like the N66 is older and cannot support the modules that ARM routers do.
I probably just have an unhealthy relationship with Skynet, but I wonder if @Martineau post above might lead the way for a Skynet-stalker like me to fork Skynet for MIPS routers. Time to get the N66U out of the drawer...I found that out first hand when I was trying to install Skynet on my RT-N16 MIPS router:
Skynet install failed,
IPSet version on router not supported:
ipset v4.5, protocol version 4.
Kernel module protocol version 4.
Next release has been posted. This release provides support for the adding of custom pages to the WebUI by addons developers. There are a few other new features and updates, but no critical fixes. Install at your convenience
SNIP SNIP SNIP
[/CODE]
For installation, we need a MicroSD (remove the cover and insert it into the slot inside the router) or a USB flash drive connected on an ongoing basis.Kyrie1965 said:It is important to note that my option is not intended for the case when you need to unlock hundreds and thousands of domains. Because when the router starts, each domain from the given list is resolved. The more domains in the list, the longer the initialization of many ipset to unlock.
amtm
opkg update ; opkg upgrade ; opkg install tor tor-geoip bind-dig
nano /jffs/scripts/init_ipset.sh
modprobe ip_set
modprobe ip_set_iphash
modprobe ip_set_nethash
modprobe ip_set_setlist
ipset --create unblock iphash
chmod +x /jffs/scripts/init_ipset.sh
nano /jffs/scripts/services-start
#!/bin/sh
# This script get called after all other system services
# have been started at boot on router
# ---------------------------------------------------------
# Cron job to install after reboot
cru a unblock-ipset "3 3 * * * /opt/bin/unblock_ipset.sh"
# Run script now
/jffs/scripts/init_ipset.sh
/opt/bin/unblock_ipset.sh
chmod +x /jffs/scripts/services-start
nano /jffs/scripts/nat-start
#!/bin/sh
iptables -t nat -A PREROUTING -i br0 -p tcp -m set --set unblock dst -j REDIRECT --to-port 9141
chmod +x /jffs/scripts/nat-start
cat /dev/null > /opt/etc/tor/torrc
nano /opt/etc/tor/torrc
User admin
PidFile /opt/var/run/tor.pid
ExcludeExitNodes {RU},{UA},{AM},{KG},{BY}
StrictNodes 1
TransPort 192.168.1.1:9141
ExitRelay 0
ExitPolicy reject *:*
ExitPolicy reject6 *:*
GeoIPFile /opt/share/tor/geoip
GeoIPv6File /opt/share/tor/geoip6
DataDirectory /opt/var/lib/tor
nano /opt/etc/unblock.txt
###Torrent Trackers
rutracker.org
rutor.info
rutor.is
mega-tor.org
kinozal.tv
nnm-club.me
nnm-club.ws
tfile.me
tfile-home.org
tfile1.cc
megatfile.cc
megapeer.org
megapeer.ru
tapochek.net
tparser.org
tparser.me
rustorka.com
uniongang.tv
fast-torrent.ru
###Catalogs of media content for programs
rezka.ag
hdrezka.ag
hdrezka.me
filmix.co
filmix.cc
seasonvar.ru
###Books
lib.rus.ec
flibusta.is
flibs.me
flisland.net
flibusta.site
###Telegram
telegram.org
tdesktop.com
tdesktop.org
tdesktop.info
tdesktop.net
telesco.pe
telegram.dog
telegram.me
t.me
telegra.ph
web.telegram.org
desktop.telegram.org
updates.tdesktop.com
venus.web.telegram.org
flora.web.telegram.org
vesta.web.telegram.org
pluto.web.telegram.org
aurora.web.telegram.org
###Miscellaneous
7-zip.org
edem.tv
4pna.com
2019.vote
###Tor check
check.torproject.org
###Example of unlocking by IP (remove # at the beginning of the line)
#195.82.146.214
nano /opt/bin/unblock_ipset.sh
#!/bin/sh
until ADDRS=$(dig +short google.com @localhost) && [ -n "$ADDRS" ] > /dev/null 2>&1; do sleep 5; done
while read line || [ -n "$line" ]; do
[ -z "$line" ] && continue
[ "${line:0:1}" = "#" ] && continue
addr=$(echo $line | grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}')
if [ ! -z "$addr" ]; then
ipset --add unblock $addr
continue
fi
dig +short $line @localhost | grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | awk '{system("ipset --add unblock "$1)}'
done < /opt/etc/unblock.txt
chmod +x /opt/bin/unblock_ipset.sh
nano /opt/bin/unblock_dnsmasq.sh
#!/bin/sh
cat /dev/null > /opt/etc/unblock.dnsmasq
while read line || [ -n "$line" ]; do
[ -z "$line" ] && continue
[ "${line:0:1}" = "#" ] && continue
echo $line | grep -Eq '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' && continue
echo "ipset=/$line/unblock" >> /opt/etc/unblock.dnsmasq
done < /opt/etc/unblock.txt
chmod +x /opt/bin/unblock_dnsmasq.sh
/opt/bin/unblock_dnsmasq.sh
cat /opt/etc/unblock.dnsmasq
nano /opt/bin/unblock_update.sh
#!/bin/sh
ipset --flush unblock
/opt/bin/unblock_dnsmasq.sh
service restart_dhcpd
sleep 3
/opt/bin/unblock_ipset.sh &
chmod +x /opt/bin/unblock_update.sh
nano /opt/etc/init.d/S99unblock
#!/bin/sh
[ "$1" != "start" ] && exit 0
/opt/bin/unblock_ipset.sh &
chmod +x /opt/etc/init.d/S99unblock
nano /jffs/configs/dnsmasq.conf.add
conf-file=/opt/etc/unblock.dnsmasq
server=8.8.8.8
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!