Code:0.0.0.0 addelivery-engine-api.voodoo-ads.io 0.0.0.0 ads.mopub.com 0.0.0.0 ads.samsungads.com 0.0.0.0 analytics.query.yahoo.com 0.0.0.0 api.gameanalytics.com 0.0.0.0 api2.branch.io 0.0.0.0 app.adjust.com 0.0.0.0 app-measurement.com 0.0.0.0 browser.pipe.aria.microsoft.com 0.0.0.0 cdn.optimizely.com 0.0.0.0 cdp.cloud.unity3d.com 0.0.0.0 cfg.cml.ksmobile.com 0.0.0.0 cmdts.ksmobile.com 0.0.0.0 config.uca.cloud.unity3d.com 0.0.0.0 cprd1.samsungcloudsolution.net 0.0.0.0 data.flurry.com 0.0.0.0 ds.samsungads.com 0.0.0.0 e.crashlytics.com 0.0.0.0 front-logs.voodoo-ads.io 0.0.0.0 gate.hockeyapp.net 0.0.0.0 googleads.g.doubleclick.net 0.0.0.0 lcprd1.samsungcloudsolution.net 0.0.0.0 m.yap.yahoo.com 0.0.0.0 mobile.launchdarkly.com 0.0.0.0 mobile.pipe.aria.microsoft.com 0.0.0.0 nexus.officeapps.live.com 0.0.0.0 nexusrules.officeapps.live.com 0.0.0.0 p.presage.io 0.0.0.0 pp-measurement.com 0.0.0.0 reports.crashlytics.com 0.0.0.0 rt.applovin.com 0.0.0.0 rt.applvn.com 0.0.0.0 rubick.gameanalytics.com 0.0.0.0 sb.scorecardresearch.com 0.0.0.0 sdk.hockeyapp.net 0.0.0.0 securepubads.g.doubleclick.net 0.0.0.0 settings.crashlytics.com 0.0.0.0 sourcepoint.vice.com 0.0.0.0 ssl.google-analytics.com 0.0.0.0 telemetry.dropbox.com 0.0.0.0 track.tenjin.io 0.0.0.0 ups.ksmobile.net 0.0.0.0 vortex.data.microsoft.com 0.0.0.0 www.googleadservices.com
Purge your domain certificates. In Diversion this is in ep, 3, 1.Are these normal?
Jul 28 00:11:22 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: bad cert. client 192.168.1.26:58913 server mobile.pipe.aria.microsoft.com
Jul 28 00:12:04 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:50985 server web.vortex.data.microsoft.com
Jul 28 00:12:04 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:50986 server www.googletagmanager.com
Jul 28 00:12:04 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:50987 server www.googletagservices.com
Jul 28 00:12:04 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:50989 server c.amazon-adsystem.com
Jul 28 00:12:18 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:51012 server web.vortex.data.microsoft.com
Jul 28 00:12:18 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:51013 server www.googletagmanager.com
Jul 28 00:12:18 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:51014 server www.googletagservices.com
Jul 28 00:12:18 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:51016 server c.amazon-adsystem.com
Jul 28 00:12:23 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56449 server www.googletagmanager.com
Jul 28 00:12:23 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56450 server www.googletagservices.com
Jul 28 00:12:23 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56451 server c.amazon-adsystem.com
Jul 28 00:12:23 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56452 server web.vortex.data.microsoft.com
Jul 28 00:12:24 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56454 server www.googletagmanager.com
Jul 28 00:12:24 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56455 server www.googletagservices.com
Jul 28 00:12:24 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56456 server c.amazon-adsystem.com
Jul 28 00:12:24 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56457 server web.vortex.data.microsoft.com
Jul 28 00:12:25 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56459 server web.vortex.data.microsoft.com
Jul 28 00:12:25 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56461 server adservice.google.com
Jul 28 00:12:37 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56482 server web.vortex.data.microsoft.com
Jul 28 00:12:38 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56487 server www.googletagmanager.com
Jul 28 00:12:38 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56488 server www.googletagservices.com
Jul 28 00:12:38 RT-AC68U-20E0 pixelserv-tls[17973]: handshake failed: unknown cert. client 192.168.1.26:56490 server c.amazon-adsystem.com
I'm new to diversion and appreciate very much for this ad-blocking script.
I also hit the issue on amazon app, and it said the dog image. The suggested list is added into whitelist, and then sort and process/
However, dnsmasq.log shows the ann.amazon.com is blocked. Any comment?
Aug 1 17:43:18 dnsmasq[18957]: blocked by blockinglist aan.amazon.com is 192.168.50.2
On installing Diversion and opting for https coverage, I was told:
Remember to import the pixelserv-tls
...
Later, based on some research, I found out how to install it in Firefox/Mac. I still don't know how to install it in Firefox iOS. More generally, I was looking forward to telling the person living in the house in which I'm installing an AC86U that the router now does ad blocking. I guess it does, for http:, but I don't know if it's going to be feasible for her to install a certificate for each of her devices. I don't know what nor how many devices she uses.
Am I making this harder than it needs to be?
That's good to know! Now I'm curious as to what difference in the experience it makes after installation of the cert.she'll still have an appreciably-improved browsing experience, whether or not she installs the cert
Alas, not for Firefox/iOS. I noticed that it's been a couple of years since that wiki page has been edited.The wiki page has instructions for installing on various devices/browsers, and might be helpful for your iOS question.
In the last step, i.e., after accessing the ca.crt UFL with Safari and responding positively to the ensuing popup, in Settings under "Enable full trust for root certificates" I see nothing about Pixelserv, only these two on/off buttons:Since iOS 10.3, a user-installed CA cert requires enabling trust explicitly.
This tip is provided by @jrmwvu04 on snbforums.
- Go to Settings > General About > Certificate Trust Settings.
- Under Enable full trust for root certificates, turn on trust for Pixelserv CA.
That's good to know! Now I'm curious as to what difference in the experience it makes after installation of the cert.
Alas, not for Firefox/iOS. I noticed that it's been a couple of years since that wiki page has been edited.
But it provides a procedure for system-wide installation for iOS/Android, with this note appended:
In the last step, i.e., after accessing the ca.crt UFL with Safari and responding positively to the ensuing popup, in Settings under "Enable full trust for root certificates" I see nothing about Pixelserv, only these two on/off buttons:
AddTrust External CA RootUSERTrust RSA Certificatio...The first one was on, the second one off.
EDIT: I was able to successfully install on iOS. The wiki instructions are very abbreviated. A step-by-step would encompass a dozen or "clicks" (iOS: touches) of different things. I don't think I'll attempt conveying that to my non-techie friend. But, reminder of what I wrote at the top of this reply: I'm curious as to what improvement cert installation provides to our browsing experience.
I am finding that about 90% of the blocked sites are now doing other things that reject the image anyway, so that the improvement is only working for 10%. Still worthwhile.The ca.crt import is required so that served image appears to be coming from a legitimate website.
Questions from a relative newbie:I am finding that about 90% of the blocked sites are now doing other things that reject the image anyway, so that the improvement is only working for 10%. Still worthwhile.
req | 3146 | total # of requests (HTTP, HTTPS, success, failure etc) |
slh | 113 | # of accepted HTTPS requests |
slm | 132 | # of rejected HTTPS requests (missing certificate) |
sle | 0 | # of rejected HTTPS requests (certificate available but not usable) |
slc | 1895 | # of dropped HTTPS requests (client disconnect without sending any request) |
slu | 995 | # of dropped HTTPS requests (other TLS handshake errors) |
This brought to mind that... Yesterday I set up a second AC86U at a different location from my first AC86U. As indicated recently in this thread, I installed the second AC86U's Pixelserv ca.crt on my devices. The same devices will travel with me next week when I return to where my first AC86U is. But the ca.crt there is different. Should I just overwrite the ca.crt and ca.key in the first location with the contents of those files from the second?You may want to backup ca.crt and ca.key. This will save you from generating and importing a new CA cert on client devices in the event that the original CA cert files in /opt/var/cache/pixelserv are damaged.
IP scheme the same? Are you using 192.168.1.XXX at location 1 as well as location two? I have two as well but I use 192.168.2.XXX at my second location.From the wiki:
This brought to mind that... Yesterday I set up a second AC86U at a different location from my first AC86U. As indicated recently in this thread, I installed the second AC86U's Pixelserv ca.crt on my devices. The same devices will travel with me next week when I return to where my first AC86U is. But the ca.crt there is different. Should I just overwrite the ca.crt and ca.key in the first location with the contents of those files from the second?
My IPs are conceptually the same as yours: 192.168.50.1 and 192.168.51.1.IP scheme the same? Are you using 192.168.1.XXX at location 1 as well as location two? I have two as well but I use 192.168.2.XXX at my second location.
Then you should have no problem importing the secondary one. I have two imported on my devices. No need to remove one to add the other.My IPs are conceptually the same as yours: 192.168.50.1 and 192.168.51.1.
What I was thinking might be a problem is that on my devices now, after having imported from one of the AC86Us, the name of the certificate is "Pixelserv CA". E.g., that's what I see in my iPhone's Certificate Trust Settings. Wouldn't the import from the second router have the same name, and if so would that cause any problem?Then you should have no problem importing the secondary one. I have two imported on my devices. No need to remove one to add the other.
I use the same certificates on all my routers. Just replace the ca.* files, then purge the domain certificates in Diversion in ep and you're good to go.From the wiki:
This brought to mind that... Yesterday I set up a second AC86U at a different location from my first AC86U. As indicated recently in this thread, I installed the second AC86U's Pixelserv ca.crt on my devices. The same devices will travel with me next week when I return to where my first AC86U is. But the ca.crt there is different. Should I just overwrite the ca.crt and ca.key in the first location with the contents of those files from the second?
This does cause a problem with Chromebooks, which will overwrite the first certificate. That's why it is essential for the VPN servers to have the same certificate, among other things, although that is a different context.Wouldn't the import from the second router have the same name, and if so would that cause any problem?
We're off-topic, so if there's anything wrong with this please point me at another thread: each of my two AC86Us has a LAN-only OpenVPN server to allow my remote access to it, and the .OVPN files are identical -- same keys -- except for the "remote" field, i.e., DDNS domain name specific to that router.it is essential for theVPN servers to have the same certificate, among other things, although that is a different context.
Thread starter | Title | Forum | Replies | Date |
---|---|---|---|---|
C | Diversion Pixelserv replacement | Asuswrt-Merlin AddOns | 2 | |
L | Is Diversion better than NextDNS, PiHole or AdGuard Home? | Asuswrt-Merlin AddOns | 10 |
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!