john9527
Part of the Furniture
LATEST RELEASE: Update-46E8
24-December-2020
Merlin fork 374.43_46E8j9527
============================
Update-46E8 Highlights
Additional Notes on OpenVPN
From the OpenVPN 2.5.0 release notes
Some notes/info for users of OpenVPN service providers
Downloads
Latest public release: https://1drv.ms/f/s!Ainhp1nBLzMJgXEJCQVqKPjosiia
Full ChangeLog: Changelog.txt in the download directory
Overview/Installation: LTS_OVERVIEW.pdf in the download directory
Previous release thread:
SHA256
(Default Build - All supported routers)
2ded0f20023cf36f3ddfa90dd2be9a29f53805bb2f73ed8ab43126cd7f837f8b RT-N16_374.43_46E8j9527.trx
b3850ce7e0a8e4ec0566da29027ce8c2e16a1155640f636817fe0605624c8734 RT-AC66U_374.43_46E8j9527.trx
4de9128ac1fd3b27abf57c159effe42ac71aae4c2390a10c5f6458cead6c5a7a RT-N66U_374.43_46E8j9527.trx
011e7e29560f120613a4eb33038d72441495a9fa4306d56e47c94d057d397a49 RT-AC68U_374.43_46E8j9527.trx
f5e63d7a6f2d1f0d5a8c49620f2c43379a306df4b813e2ab4ad306503932cba8 RT-AC56U_374.43_46E8j9527.trx
24-December-2020
Merlin fork 374.43_46E8j9527
============================
Update-46E8 Highlights
- Update OpenVPN to release 2.5 (see additional notes)
- Fix OpenVPN configurations for some service providers (see additional notes)
- Update OpenSSL to 1.1.1i
- Update libmnl and lz4
- Add new OpenVPN options stub/stubv2 and tls-crypt-v2
- OpenVPN try to negotiate CHACHA20-POLY1305 cipher if supported by the remote end
The CHACHA20-POLY1305 cipher will be added to the default cipher negotiation following a factory default reset. You may also manually add it to the cipher negotiation list. - Update IPSET userspace to release 7.6
- Update CA bundle to 2020 December 9th version
- New nvram option to attempt ntp sync without internet access
- Move WSDD start to eliminate startup errors
Additional Notes on OpenVPN
From the OpenVPN 2.5.0 release notes
- CONNECTIVITY TO SOME VPN SERVICE PROVIDER MAY BREAK
Connecting with an OpenVPN 2.5 client to at least one commercial VPN service that implemented their own cipher negotiation method that always reports back that it is using BF-CBC to the client is broken in v2.5. This has always caused warning about mismatch ciphers. We have been in contact with some service providers and they are looking into it. This is not something the OpenVPN community can fix. If your commercial VPN does not work with a v2.5 client, complain to the VPN service provider.
As a result, the deprecated 'Cipher Negotiation Disable' (ncp-disable) option has NOT been removed from the gui. A syslog warning msg will be generated, but at present it still can be used to force a specific cipher with the Legacy/Fallback Cipher setting.
Some notes/info for users of OpenVPN service providers
- Private Internet Access (PIA) has started pushing DNS servers with private addresses (10.0.0.241 - 10.0.0.244) when connecting to their next gen servers. In previous releases, these addresses would work fine when 'Redirect Internet traffic' is set to 'All'. However, when using 'Policy Rules' for policy based routing, these DNS servers would not be accessable. If 'Accept DNS Configuration' was then also set to 'Exclusive', all DNS lookups and therefore internet access will fail. Attempting to manually add a route through OpenVPN would also not be successful.
This release will correctly process a route added in the 'Custom Configuration' section to allow access to these private DNS servers. You may check DNSMASQ or the OpenVPN PUSH_REPLY message to determine which server PIA is sending to the router. For example, adding
route 10.0.0.243 255.255.255.255
will allow access to the PIA DNS+Streaming private address DNS server which seems to be the default server.
Further info on the PIA next gen DNS can be found at
- Some providers have also started pushing IPv6 route information when connecting to their servers. The current router OpenVPN does not support IPv6 and if you are running dual stack you may experience problems. The following will now automatically be added to the configuration for the OpenVPN clients
pull-filter ignore "ifconfig-ipv6"
pull-filter ignore "route-ipv6"
Downloads
Latest public release: https://1drv.ms/f/s!Ainhp1nBLzMJgXEJCQVqKPjosiia
Full ChangeLog: Changelog.txt in the download directory
Overview/Installation: LTS_OVERVIEW.pdf in the download directory
Previous release thread:
Release - [Fork] Asuswrt-Merlin 374 LTS release 45EC
The next release 46E8 is now available https://www.snbforums.com/threads/fork-asuswrt-merlin-374-lts-release-46e8.68757/ LATEST RELEASE: Update-45EC 19-November-2020 Merlin fork 374.43_45ECj9527 ============================ Picks up a few fixes for problems reported since the last release...
www.snbforums.com
SHA256
(Default Build - All supported routers)
2ded0f20023cf36f3ddfa90dd2be9a29f53805bb2f73ed8ab43126cd7f837f8b RT-N16_374.43_46E8j9527.trx
b3850ce7e0a8e4ec0566da29027ce8c2e16a1155640f636817fe0605624c8734 RT-AC66U_374.43_46E8j9527.trx
4de9128ac1fd3b27abf57c159effe42ac71aae4c2390a10c5f6458cead6c5a7a RT-N66U_374.43_46E8j9527.trx
011e7e29560f120613a4eb33038d72441495a9fa4306d56e47c94d057d397a49 RT-AC68U_374.43_46E8j9527.trx
f5e63d7a6f2d1f0d5a8c49620f2c43379a306df4b813e2ab4ad306503932cba8 RT-AC56U_374.43_46E8j9527.trx
Last edited: