Hi everybody, first of all big up for the community and all the hard work that's being done here. Really cool to see.
I decided to switch from DD-WRT to Voxel after reading many good things. However, after a day of tinkering and reading, I'm a bit stuck. My main use case is OpenVPN running directly from the R7800, so this has been my focus when starting.
For some context: I run a pihole on a dedicated Pi, have an Ubuntu server, some audio, a macbook and some streaming devices.
Two issues:
1. After starting OpenVPN, I can't connect to the web anymore. Seems like a DNS issue (it's always DNS), but I'm not knowledgeable enough yet to debug it.
2. After trying to get OpenVPN working I got flood with log entries on my pihole. I read this is a Microsoft service, but I have no Microsoft gear in my setup. I think either OpenVPN, DNScrypt or the![Smile :) :)](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f642.png)
Curious for your advice!
I decided to switch from DD-WRT to Voxel after reading many good things. However, after a day of tinkering and reading, I'm a bit stuck. My main use case is OpenVPN running directly from the R7800, so this has been my focus when starting.
For some context: I run a pihole on a dedicated Pi, have an Ubuntu server, some audio, a macbook and some streaming devices.
Two issues:
1. After starting OpenVPN, I can't connect to the web anymore. Seems like a DNS issue (it's always DNS), but I'm not knowledgeable enough yet to debug it.
Code:
2022-04-09 20:24:29 WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
2022-04-09 20:24:29 OpenVPN 2.5.6 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
2022-04-09 20:24:29 library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10
2022-04-09 20:24:29 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2022-04-09 20:24:29 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-09 20:24:29 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-09 20:24:29 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-09 20:24:29 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-09 20:24:29 nice -20 succeeded
2022-04-09 20:24:29 TCP/UDP: Preserving recently used remote address: [AF_INET]217.138.206.106:1198
2022-04-09 20:24:29 Socket Buffers: R=[212992->425984] S=[212992->425984]
2022-04-09 20:24:29 UDP link local: (not bound)
2022-04-09 20:24:29 UDP link remote: [AF_INET]217.138.206.106:1198
2022-04-09 20:24:30 TLS: Initial packet from [AF_INET]217.138.206.106:1198, sid=cd3defa8 babed181
2022-04-09 20:24:30 VERIFY OK: depth=1, CN=ChangeMe
2022-04-09 20:24:30 VERIFY KU OK
2022-04-09 20:24:30 Validating certificate extended key usage
2022-04-09 20:24:30 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-04-09 20:24:30 VERIFY EKU OK
2022-04-09 20:24:30 VERIFY OK: depth=0, CN=server
2022-04-09 20:24:30 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 36034'
2022-04-09 20:24:30 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 36000'
2022-04-09 20:24:30 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-04-09 20:24:30 [server] Peer Connection Initiated with [AF_INET]217.138.206.106:1198
2022-04-09 20:24:31 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
2022-04-09 20:24:31 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.255.0.4,route-gateway 10.10.1.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.10.1.5 255.255.255.0,peer-id 3,auth-tokenSESS_ID,cipher AES-256-GCM'
2022-04-09 20:24:31 WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
2022-04-09 20:24:31 OPTIONS IMPORT: timers and/or timeouts modified
2022-04-09 20:24:31 OPTIONS IMPORT: --ifconfig/up options modified
2022-04-09 20:24:31 OPTIONS IMPORT: route options modified
2022-04-09 20:24:31 OPTIONS IMPORT: route-related options modified
2022-04-09 20:24:31 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2022-04-09 20:24:31 OPTIONS IMPORT: peer-id set
2022-04-09 20:24:31 OPTIONS IMPORT: adjusting link_mtu to 1624
2022-04-09 20:24:31 OPTIONS IMPORT: data channel crypto options modified
2022-04-09 20:24:31 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-09 20:24:31 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-09 20:24:31 net_route_v4_best_gw query: dst 0.0.0.0
2022-04-09 20:24:31 net_route_v4_best_gw result: via <GATEWAY_IP> dev brwan
2022-04-09 20:24:31 TUN/TAP device tun21 opened
2022-04-09 20:24:31 TUN/TAP TX queue length set to 1000
2022-04-09 20:24:31 net_iface_mtu_set: mtu 1500 for tun21
2022-04-09 20:24:31 net_iface_up: set tun21 up
2022-04-09 20:24:31 net_addr_v4_add: 10.10.1.5/24 dev tun21
2022-04-09 20:24:31 /etc/openvpn/ovpnclient-up.sh tun21 1500 1624 10.10.1.5 255.255.255.0 init
2022-04-09 20:24:31 net_route_v4_add: 217.138.206.106/32 via <GATEWAY_IP> dev [NULL] table 0 metric -1
2022-04-09 20:24:31 net_route_v4_add: 0.0.0.0/1 via 10.10.1.1 dev [NULL] table 0 metric -1
2022-04-09 20:24:31 net_route_v4_add: 128.0.0.0/1 via 10.10.1.1 dev [NULL] table 0 metric -1
2022-04-09 20:24:31 Initialization Sequence Completed
/opt/xagent/run-xagent.sh: /opt/xagent/run-xagent.sh: 3: system: not found
/opt/xagent/run-xagent.sh: /opt/xagent/run-xagent.sh: 4: system: not found
Please specify hardware_id (by --hardware_id option) to run xagent.
It should contain only upper latin letters and numbers and have 13 symbols
/opt/xagent/xagent: [-d|--daemon] [-c|--config_file <file name>]
[--disable_console] [--disable_log_file] [--model_id]
[--ca_path <path to CA folder>] [--ca_file <path to cert file>]
[--log_debug|--log_info|--log_warning|--log_error|--log_silent]
[-w|--watchdog] [-v|--version] [--log_file <filename>]
[-s|--service_id <service_id>] [--discovery_time <discovery time>]
[--discovery_id <id>] [--carrier_id <id>] [--discovery_data <data>]
[--start_paused] [--log_file_cnt <count of files in rotation>]
[--log_file_size <max size of log file before rotation in human format: nK|nM where n in 1-9999>]
[--pid_file <pid_file>] [--watchdog_pid_file <pid_file>]
[--broker_keepalive <time>,<probes>,<intv>] [--agent_keepalive <time>,<probes>,<intv>]
[--agent_heartbeat <time>]
--hardware_id <hardware id> [--model_id <model_id>]
Content-type:text/html
2. After trying to get OpenVPN working I got flood with log entries on my pihole. I read this is a Microsoft service, but I have no Microsoft gear in my setup. I think either OpenVPN, DNScrypt or the
adguard-dns
addition in /etc/dnscrypt.con/.
somehow caused this. However, reverting these options, or even installing from scratch hasn't solved it. It's poluting the logs, so it would be nice to get rid of it. ![Smile :) :)](https://cdn.jsdelivr.net/joypixels/assets/8.0/png/unicode/64/1f642.png)
Curious for your advice!
Last edited: