heysoundude
Part of the Furniture
https://github.com/new Take their hand and follow along...Just need to figure out how github works and how to commit files. Guessing compiling the kernel module was the easy part ;-)
https://github.com/new Take their hand and follow along...Just need to figure out how github works and how to commit files. Guessing compiling the kernel module was the easy part ;-)
So should we wait on the RC3 or? i can test speeds with and without the patch if needed.This thread reported a performance issue
so back in May 2021, a patch was applied toWireguard - Session Manager - Discussion thread (CLOSED/EXPIRED Oct 2021 use http://www.snbforums.com/threads/session-manager-discussion-2nd-thread.75129/)
Here are some of my observations and input from a new install of wg_manager v4.11b3: 1. On a remote peer server I created a device peer: Device Auto IP DNS Allowed IPs Annotate MSG X 10.50.1.3/32 192.168.2.1 0.0.0.0/0 # MSG "Device" From the local PC I logged...www.snbforums.comwireguard_manager
on the Github dev branch.......
Update wg_manager.sh · MartineauUK/wireguard@2d7b475
Fix Do not allow 'device' Road-Warrior Peers 'auto=X' to be changed. Fix 'peer wgxx dump' command selection typo to use correct SQL table for 'client' rather 'c...github.com
Not sure if it is still relevant/warranted or should now be backed-out as the RT-AX86U kernel seemingly controls it anyway?
Wireguard - Session Manager - Discussion (2nd) thread
This thread http://www.snbforums.com/threads/session-manager.70787/ has now expired. Thanks for the heads-up SNB Forum member @Ubimowww.snbforums.com
mv /jffs/addons/wireguard/wireguard-tools_1.0.20210315-1_aarch64-3.10.ipk /jffs/addons/wireguard/wireguard-tools_1.0.20210315-1_aarch64-3.10.ipkZ
cp /tmp/wireguard-tools_1.0.20210914-1_aarch64-3.10.ipk /jffs/addons/wireguard/wireguard-tools_1.0.20210914-1_aarch64-3.10.ipk
wireguard_manager
e = Exit Script [?]
E:Option ==> loadmod
Loading WireGuard Kernel module and Userspace Tool for RT-AC86U (v386.4)
Package wireguard-kernel (1.0.20210606-ac) installed in root is up to date.
Upgrading wireguard-tools on root from 1.0.20210315-1 to 1.0.20210914-1...
Removing obsolete file /opt/etc/wireguard/S50wireguard.
Removing obsolete file /opt/etc/wireguard/wg-policy.
Removing obsolete file /opt/etc/wireguard/wg-down.
Removing obsolete file /opt/etc/wireguard/wg-up.
Removing obsolete file /opt/etc/wireguard/wg-server.
Not deleting modified conffile /opt/etc/wireguard/S50wireguard.
Not deleting modified conffile /opt/etc/wireguard/wg-policy.
Not deleting modified conffile /opt/etc/wireguard/wg-down.
Not deleting modified conffile /opt/etc/wireguard/wg-up.
Not deleting modified conffile /opt/etc/wireguard/wg-server.
Configuring wireguard-tools.
Collected errors:
* file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/S50wireguard: No such file or directory.
* file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-policy: No such file or directory.
* file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-down: No such file or directory.
* file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-up: No such file or directory.
* file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-server: No such file or directory.
wireguard: WireGuard 1.0.20210606 loaded. See www.wireguard.com for information.
wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
wireguard_manager
doesn't use any of the above, so it is just spurious noise that can be ignored wg -v
wireguard-tools v1.0.20210914 - https://git.zx2c4.com/wireguard-tools/
Your call/choiceSo should we wait on the RC3 or? i can test speeds with and without the patch if needed.
I would love to test it without the patch. Is there a way of doing it?Your call/choice
Remove the three lines from the scriptI would love to test it without the patch. Is there a way of doing it?
if [ "$HARDWARE_MODEL" == "RT-AX86U" ];then
[ -n "$(fc status | grep "Flow Learning Enabled")" ] && { fc disable; Say "Broadcom Packet Flow Cache learning via BLOG (Flow Cache) DISABLED"; } # v4.11 @Torson
fi
fc enable
Broadcom Packet Flow Cache learning via BLOG enabled.
Thanks again!@ZebMcKayhan
Testing your Wireguard Tools module....
Manually copied your Tools module
Install usingCode:mv /jffs/addons/wireguard/wireguard-tools_1.0.20210315-1_aarch64-3.10.ipk /jffs/addons/wireguard/wireguard-tools_1.0.20210315-1_aarch64-3.10.ipkZ cp /tmp/wireguard-tools_1.0.20210914-1_aarch64-3.10.ipk /jffs/addons/wireguard/wireguard-tools_1.0.20210914-1_aarch64-3.10.ipk
wireguard_manager
Code:e = Exit Script [?] E:Option ==> loadmod Loading WireGuard Kernel module and Userspace Tool for RT-AC86U (v386.4) Package wireguard-kernel (1.0.20210606-ac) installed in root is up to date. Upgrading wireguard-tools on root from 1.0.20210315-1 to 1.0.20210914-1... Removing obsolete file /opt/etc/wireguard/S50wireguard. Removing obsolete file /opt/etc/wireguard/wg-policy. Removing obsolete file /opt/etc/wireguard/wg-down. Removing obsolete file /opt/etc/wireguard/wg-up. Removing obsolete file /opt/etc/wireguard/wg-server. Not deleting modified conffile /opt/etc/wireguard/S50wireguard. Not deleting modified conffile /opt/etc/wireguard/wg-policy. Not deleting modified conffile /opt/etc/wireguard/wg-down. Not deleting modified conffile /opt/etc/wireguard/wg-up. Not deleting modified conffile /opt/etc/wireguard/wg-server. Configuring wireguard-tools. Collected errors: * file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/S50wireguard: No such file or directory. * file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-policy: No such file or directory. * file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-down: No such file or directory. * file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-up: No such file or directory. * file_sha256sum_alloc: Failed to open file /opt/etc/wireguard/wg-server: No such file or directory. wireguard: WireGuard 1.0.20210606 loaded. See www.wireguard.com for information. wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
wireguard_manager
doesn't use any of the above, so it is just spurious noise that can be ignored
Rebooted
Code:wg -v wireguard-tools v1.0.20210914 - https://git.zx2c4.com/wireguard-tools/
Looks good again!
The toughest thing(s) about github are your handle and your repo names.Thanks again!
Just updated both kernel modules and tools as well with no surprises...
If all continous to work good I can look into setting up github this weekend if I find the time.
//Zeb
Be patient - @ZebMcKayhan's modules are effectively in ALPHA testing, and there is no point rolling out the modules to the general public without proper testing.How can I update to the latest kernel module and tools?
More unsubstantiated claims regarding WireGuard's potential security flaws certainly doesn't motivate me to continue with script development,I just feel more safe if I use the latest kernel module and tools. Call me paranoiac. :-D
wireguard_manager
is just a wrapper but I cannot categorically state if @ZebMcKayhan's modules are (by accident or design) riddled with security exposures/threats or are in fact actually more secure than the @Odkrys modules simply by virtue of the fact that the modules have newer version numbers/compile timestamps. OK!
I don't miss anything, it's a great script/tool, thanks!
I just feel more safe if I use the latest kernel module and tools. Call me paranoiac. :-D
what we have here is a good ol' fashioned horse race between two small teams of devs to bring something to users- the Asus team, and the SNB-Merlin team.Be patient - @ZebMcKayhan's modules are effectively in ALPHA testing, and there is no point rolling out the modules to the general public without proper testing.
killswitch off
Thanks, I will try that.I remember seeing this issue during the early days. What I think changed the behavior was commenting out the KILLSWITCH line in/jffs/addons/wireguard/WireguardVPN.conf
. Never had that issue since.
# WireGuard Session Manager v4.01
# Categories
clients=wg11
Clients=wg11
None=
# WAN KILL-Switch
KILLSWITCH
# Statistics Gathering
STATS
Thanks, I will try that.
Just tried executing wg_firewall manually and it seems to break wg11 and not completing so I aborted after like 5min. After that wg11 got out of sync so needed to reboot.
Wonder if my WireguardVPN.conf is funky:
Code:# WireGuard Session Manager v4.01 # Categories clients=wg11 Clients=wg11 None= # WAN KILL-Switch KILLSWITCH # Statistics Gathering STATS
I don't believe that wireguard_manager auto updates the categories?, so any categories must be manually defined.Why is there 2 wg11 and no wg12?
e = Exit Script [?]
E:Option ==> peer category clients add wg11
'Peer category 'clients' created
e = Exit Script [?]
E:Option ==> peer category Clients add wg11
'Peer category 'Clients' created
e = Exit Script [?]
E:Option ==> peer category
Peer categories
Clients=wg11
clients=wg11
I may have originally included 'KILLSWITCH' by default rather than '#KILLSWITCH', but decided that whilst commandEdit: never mind, figured it out... I must be blind. I commented killswitch and now it works. Thanks again!
killswitch disable
can be used, it is temporary, given that the killswitch feature should be hard to be permanently disabled by accident or on a whim..Thanks, guess it was kind of late last night and I jumped to the wrong conclusion, sorry about that.I don't believe that wireguard_manager auto updates the categories?, so any categories must be manually defined.
I may have originally included 'KILLSWITCH' by default rather than '#KILLSWITCH', but decided that whilst commandkillswitch disable
can be used, it is temporary, given that the killswitch feature should be hard to be permanently disabled by accident or on a whim..
killswitch disable
vx
No, as explained in the previous post, theI hade a quick glance at the code but could really find any way of actually making the script change the .conf file, but you are saying that
would create the # for you?Code:killswitch disable
killswitch
command never alters the .conf file.Wasn't aware that it wasn't applied if appropriate @boot - could be an embarrassing bug.I'm still confused about why the killswitch isnt engaged at normal boot even though the # is not there.
wg_firewall
was executed (if not explicitly proven to be called from nat-start
)Oct 15 09:55:07 RT-AC86U-6160 WAN_Connection: WAN was restored.
Oct 15 09:55:07 RT-AC86U-6160 Samba_Server: daemon is started
Oct 15 09:55:07 RT-AC86U-6160 wsdd2[3237]: starting.
Oct 15 09:55:07 RT-AC86U-6160 kernel: wireguard: WireGuard 1.0.20210606 loaded. See www.wireguard.com for information.
Oct 15 09:55:07 RT-AC86U-6160 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Oct 15 09:55:07 RT-AC86U-6160 miniupnpd[3244]: HTTP listening on port 56809
Oct 15 09:55:07 RT-AC86U-6160 miniupnpd[3244]: Listening for NAT-PMP/PCP traffic on port 5351
Oct 15 09:55:07 RT-AC86U-6160 avahi-daemon[3168]: Server startup complete. Host name is RT-AC86U-6160.local. Local service cookie is 650580588.
Oct 15 09:55:07 RT-AC86U-6160 avahi-daemon[3168]: Alias name "RT-AC86U" successfully established.
Oct 15 09:55:08 RT-AC86U-6160 wireguard-clientwg12: Initialising Wireguard VPN client Peer (wg12) in Policy Mode to 209.58.188.180:51820 (# Mullvad)
Oct 15 09:55:08 RT-AC86U-6160 wireguard-clientwg12: Executing Event:wg12-route-up.sh
Oct 15 09:55:08 RT-AC86U-6160 wireguard-clientwg12: Warning: No Selective Routing rules found
Oct 15 09:55:08 RT-AC86U-6160 wireguard-clientwg12: ***ERROR IPSet 'Netflix' does NOT EXIST! for routing through VPN 'client' Peer wg12
Oct 15 09:55:08 RT-AC86U-6160 wireguard-clientwg12: Initialisation complete.
Oct 15 09:55:08 RT-AC86U-6160 (wg_manager.sh): 2804 v4.11bC Initialising Wireguard VPN 'server' Peer (wg21)
Oct 15 09:55:08 RT-AC86U-6160 wireguard-server1: Initialising Wireguard VPN 'Server' Peer (\e[95mwg21\e[92m) on 192.168.0.1:51820
Oct 15 09:55:08 RT-AC86U-6160 wireguard-server1: Initialisation complete.
Oct 15 09:55:11 RT-AC86U-6160 (wg_firewall): 4321 Checking if WireGuard VPN Peer KILL-Switch is required.....
Oct 15 09:55:11 RT-AC86U-6160 (wg_firewall): 4321 Restarting WireGuard to reinstate RPDB/firewall rules
Oct 15 09:55:11 RT-AC86U-6160 (wg_manager.sh): 4342 v4.11bC Requesting WireGuard VPN Peer stop (wg12 wg21)
Oct 15 09:55:11 RT-AC86U-6160 (wg_manager.sh): 4342 v4.11bC Requesting termination of WireGuard VPN 'client' Peer ('wg12')
Oct 15 09:55:12 RT-AC86U-6160 (wg_manager.sh): 4342 wg12:[97m transfer: 92 B received, 180 B sent [97m0 Days, 00:00:04 from 2021-10-15 09:55:08 >>>>>>[0m
Oct 15 09:55:12 RT-AC86U-6160 (wg_manager.sh): 4342 wg12: period : 92 Bytes received, 180 Bytes sent (Rx=92;Tx=180)
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!