can you please send it as PM "start a conversation" ?
Just be patient folk.. US will be in soon. I revised the rule further after input from a buddy. I believe that will work very well in stock Merlin firmware.
can you please send it as PM "start a conversation" ?
@EnF70, I think the mark set e.g. 0x1 in your case isn't consumed anywhere. I believe the idea is that we want the packets to bypass CTF with the actions of marking. What actually marked doesn't matter. Binary OR gives us a sweet deal.
I believe the difference is there but I can't measure it at hundreds of megabit speed.
Mar 2 11:47:11 kernel: [truncated] L/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NULL/npch ==NUL
Mar 2 11:47:14 openvpn[782]: client1/0.0.0.0:50691 write TCPv4_SERVER: Connection timed out (code=110)
Mar 2 11:47:14 openvpn[782]: client1/0.0.0.0:50691 write TCPv4_SERVER: Broken pipe (code=32)
Mar 2 11:47:14 openvpn[782]: client1/0.0.0.0:50691 write TCPv4_SERVER: Broken pipe (code=32)
Mar 2 11:47:14 openvpn[782]: client1/0.0.0.0:50691 write TCPv4_SERVER: Broken pipe (code=32)
[...]
Mar 2 11:47:14 openvpn[782]: client1/0.0.0.0:50691 Connection reset, restarting [0]
Mar 2 11:47:14 openvpn[782]: client1/0.0.0.0:50691 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mar 2 11:47:56 openvpn[782]: client1/0.0.0.0:50824 Connection reset, restarting [0]
Mar 2 11:47:56 openvpn[782]: client1/0.0.0.0:50824 SIGUSR1[soft,connection-reset] received, client-instance restarting
When you say you can't measure it at hundreds of megabit speed are you referring to VPN traffic?
I would assert the speed boost seen in latest Alpha 3 the magic in CTF improvement itself.
I know latest Alpha 3 has marking rules added. So flush everything in iptables before my quick tests.
I did a search for dpi and openvpn and ended up here, basically when the bandwidth /app analysis functions are activated
my openvpn client speed drops alot.
Is the jist of this thread that the newer firmware will stop this??
I was referring to efficiency of "--set-mark 0x1" vs "--or-mark 0".
Regarding the effect (and to how much extent it helps overcome CTF pitfalls) of marking packets, personally I've reached my conclusion at the moment as I posted in #178...
The other side of the rule is "-j CONNMARK".
if OpenVPN could do multi-thread (multi-core) I guess we could have ~100Mbps VPN with AES-128 on AC68U
connmark was a mistake to suggest. If you want to keep a CTF bypass rule, consider the revised version from my earlier post. It potentially could recoup up to an extra 5 Mbit/s.
But again, the effect of such a rule is nullified for OpenVPN in the Alpha 3 code base... 'cos CTF itself is doing very well. And in the older firmware, such a bypass rule cannot beat the performance with CTF disabled...
For enterprising enthusiasts, I would suggest a little project: port the kernel from SDK 7 (i.e. AC88U) to AC56/AC68/AC87. I expect we will gain lots of performance including CTF.
I just wanted to chime in here speaking with regard to CTF and openvpn client usage on my AC68. I disabled CTF long ago because when enabled I noticed that I was getting lots of "leaks" around the VPN tunnel. These "leaks" were connections that were established prior to VPN tunnel creation that were not cut off as they should have been. All traffic was meant to pass through the VPN tunnel, yet netstat-nat tables showed the WAN interface was being used for the still-established connections. My testing showed that with CTF off the "leaks" went away. So, any chance this behavior has changed recently?
I am on Alpha3 and I think there are still issues with CTF enabled if we don't mark packets.
I am on Alpha3 and I think there are still issues with CTF enabled if we don't mark packets
I know, I see the rules in iptables - thanks for adding themalpha 3 marks packets already.
iptables -t mangle -A PREROUTING -i tun21 -m conntrack --ctstate NEW -j MARK --or-mark 0
iptables -L -t mangle -vn
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!