Hi everybody, first of all big up for the community and all the hard work that's being done here. Really cool to see.
I decided to switch from DD-WRT to Voxel after reading many good things. However, after a day of tinkering and reading, I'm a bit stuck. My main use case is OpenVPN running directly from the R7800, so this has been my focus when starting.
For some context: I run a pihole on a dedicated Pi, have an Ubuntu server, some audio, a macbook and some streaming devices.
Two issues:
1. After starting OpenVPN, I can't connect to the web anymore. Seems like a DNS issue (it's always DNS), but I'm not knowledgeable enough yet to debug it.
2. After trying to get OpenVPN working I got flood with log entries on my pihole. I read this is a Microsoft service, but I have no Microsoft gear in my setup. I think either OpenVPN, DNScrypt or the
Curious for your advice!
I decided to switch from DD-WRT to Voxel after reading many good things. However, after a day of tinkering and reading, I'm a bit stuck. My main use case is OpenVPN running directly from the R7800, so this has been my focus when starting.
For some context: I run a pihole on a dedicated Pi, have an Ubuntu server, some audio, a macbook and some streaming devices.
Two issues:
1. After starting OpenVPN, I can't connect to the web anymore. Seems like a DNS issue (it's always DNS), but I'm not knowledgeable enough yet to debug it.
Code:
2022-04-09 20:24:29 WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
2022-04-09 20:24:29 OpenVPN 2.5.6 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2022-04-09 20:24:29 library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10
2022-04-09 20:24:29 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2022-04-09 20:24:29 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-09 20:24:29 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-09 20:24:29 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-09 20:24:29 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-09 20:24:29 nice -20 succeeded
2022-04-09 20:24:29 TCP/UDP: Preserving recently used remote address: [AF_INET]217.138.206.106:1198
2022-04-09 20:24:29 Socket Buffers: R=[212992->425984] S=[212992->425984]
2022-04-09 20:24:29 UDP link local: (not bound)
2022-04-09 20:24:29 UDP link remote: [AF_INET]217.138.206.106:1198
2022-04-09 20:24:30 TLS: Initial packet from [AF_INET]217.138.206.106:1198, sid=cd3defa8 babed181
2022-04-09 20:24:30 VERIFY OK: depth=1, CN=ChangeMe
2022-04-09 20:24:30 VERIFY KU OK
2022-04-09 20:24:30 Validating certificate extended key usage
2022-04-09 20:24:30 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-04-09 20:24:30 VERIFY EKU OK
2022-04-09 20:24:30 VERIFY OK: depth=0, CN=server
2022-04-09 20:24:30 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 36034'
2022-04-09 20:24:30 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 36000'
2022-04-09 20:24:30 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-04-09 20:24:30 [server] Peer Connection Initiated with [AF_INET]217.138.206.106:1198
2022-04-09 20:24:31 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
2022-04-09 20:24:31 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.255.0.4,route-gateway 10.10.1.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.10.1.5 255.255.255.0,peer-id 3,auth-tokenSESS_ID,cipher AES-256-GCM'
2022-04-09 20:24:31 WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
2022-04-09 20:24:31 OPTIONS IMPORT: timers and/or timeouts modified
2022-04-09 20:24:31 OPTIONS IMPORT: --ifconfig/up options modified
2022-04-09 20:24:31 OPTIONS IMPORT: route options modified
2022-04-09 20:24:31 OPTIONS IMPORT: route-related options modified
2022-04-09 20:24:31 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2022-04-09 20:24:31 OPTIONS IMPORT: peer-id set
2022-04-09 20:24:31 OPTIONS IMPORT: adjusting link_mtu to 1624
2022-04-09 20:24:31 OPTIONS IMPORT: data channel crypto options modified
2022-04-09 20:24:31 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-09 20:24:31 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-09 20:24:31 net_route_v4_best_gw query: dst 0.0.0.0
2022-04-09 20:24:31 net_route_v4_best_gw result: via <GATEWAY_IP> dev brwan
2022-04-09 20:24:31 TUN/TAP device tun21 opened
2022-04-09 20:24:31 TUN/TAP TX queue length set to 1000
2022-04-09 20:24:31 net_iface_mtu_set: mtu 1500 for tun21
2022-04-09 20:24:31 net_iface_up: set tun21 up
2022-04-09 20:24:31 net_addr_v4_add: 10.10.1.5/24 dev tun21
2022-04-09 20:24:31 /etc/openvpn/ovpnclient-up.sh tun21 1500 1624 10.10.1.5 255.255.255.0 init
2022-04-09 20:24:31 net_route_v4_add: 217.138.206.106/32 via <GATEWAY_IP> dev [NULL] table 0 metric -1
2022-04-09 20:24:31 net_route_v4_add: 0.0.0.0/1 via 10.10.1.1 dev [NULL] table 0 metric -1
2022-04-09 20:24:31 net_route_v4_add: 128.0.0.0/1 via 10.10.1.1 dev [NULL] table 0 metric -1
2022-04-09 20:24:31 Initialization Sequence Completed
/opt/xagent/run-xagent.sh: /opt/xagent/run-xagent.sh: 3: system: not found
/opt/xagent/run-xagent.sh: /opt/xagent/run-xagent.sh: 4: system: not found
Please specify hardware_id (by --hardware_id option) to run xagent.
It should contain only upper latin letters and numbers and have 13 symbols
/opt/xagent/xagent: [-d|--daemon] [-c|--config_file <file name>]
[--disable_console] [--disable_log_file] [--model_id]
[--ca_path <path to CA folder>] [--ca_file <path to cert file>]
[--log_debug|--log_info|--log_warning|--log_error|--log_silent]
[-w|--watchdog] [-v|--version] [--log_file <filename>]
[-s|--service_id <service_id>] [--discovery_time <discovery time>]
[--discovery_id <id>] [--carrier_id <id>] [--discovery_data <data>]
[--start_paused] [--log_file_cnt <count of files in rotation>]
[--log_file_size <max size of log file before rotation in human format: nK|nM where n in 1-9999>]
[--pid_file <pid_file>] [--watchdog_pid_file <pid_file>]
[--broker_keepalive <time>,<probes>,<intv>] [--agent_keepalive <time>,<probes>,<intv>]
[--agent_heartbeat <time>]
--hardware_id <hardware id> [--model_id <model_id>]
Content-type:text/html
2. After trying to get OpenVPN working I got flood with log entries on my pihole. I read this is a Microsoft service, but I have no Microsoft gear in my setup. I think either OpenVPN, DNScrypt or the
adguard-dns
addition in /etc/dnscrypt.con/.
somehow caused this. However, reverting these options, or even installing from scratch hasn't solved it. It's poluting the logs, so it would be nice to get rid of it. Curious for your advice!
Last edited: