I do not recall setting that, but I think it might be part of the adblock package - there is /tmp/dnsmasq.d/adb_list.overall which contains a ton of domains that I would guess are tracking domains. Disabling adblock (from LuCI) does not solve my issue.
# ubus call system board
{
"kernel": "5.10.161",
"hostname": "OpenWrt-Router",
"system": "ARMv8 Processor rev 4",
"model": "Linksys E8450 (UBI)",
"board_name": "linksys,e8450-ubi",
"rootfs_type": "squashfs",
"release": {
"distribution": "OpenWrt",
"version": "22.03.3",
"revision": "r20028-43d71ad93e",
"target": "mediatek/mt7622",
"description": "OpenWrt 22.03.3 r20028-43d71ad93e"
}
}
Re. the older version: I've been meaning to update OpenWrt, but on my router if I want to go any newer I need to jump through a couple hoops to rearrange partitions into UBI (it doesn't seem to complicated, but I haven't had a chance where I can afford downtime in the event of an issue). Is there a chance updating would fix it?
# cat /etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd32:0d63:e7ab::/48'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan1'
list ports 'lan2'
list ports 'lan3'
list ports 'lan4'
config interface 'lan'
option proto 'static'
option ip6assign '60'
option device 'br-lan.101'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
config interface 'wan'
option device 'wan'
option proto 'dhcp'
option peerdns '0'
list dns '1.1.1.1'
list dns '1.0.0.1'
list dns '2606:4700:4700::1111'
list dns '2606:4700:4700::1001'
config interface 'wan6'
option device 'wan'
option proto 'dhcpv6'
config interface 'vpn'
option proto 'wireguard'
option private_key 'REDACTED'
option listen_port '51820'
list addresses '192.168.9.1/24'
list addresses 'fdf1:e8a1:8d3f:9::1/64'
config wireguard_vpn 'wgclient'
option public_key 'REDACTED'
option preshared_key 'REDACTED'
list allowed_ips '192.168.9.2/32'
list allowed_ips 'fdf1:e8a1:8d3f:9::2/128'
option description 'Generic client'
<MORE REDACTED wireguard_vpn CLIENT CONFIGS>
config interface 'iot'
option proto 'static'
option ipaddr '172.16.0.1'
option netmask '255.255.255.0'
option device 'br-lan.103'
config interface 'guest'
option proto 'static'
option ipaddr '10.10.10.10'
option netmask '255.255.255.0'
option device 'br-lan.102'
config bridge-vlan
option device 'br-lan'
option vlan '101'
list ports 'lan1:t'
list ports 'lan2:u*'
list ports 'lan3:u*'
list ports 'lan4:t'
config bridge-vlan
option device 'br-lan'
option vlan '102'
list ports 'lan1:t'
list ports 'lan4:t'
config bridge-vlan
option device 'br-lan'
option vlan '103'
list ports 'lan1:t'
list ports 'lan4:t'
config device
option name 'lan4'
config bridge-vlan
option device 'br-lan'
option vlan '104'
list ports 'lan1:t'
list ports 'lan4:t'
config interface 'CAMS'
option proto 'static'
option device 'br-lan.104'
option ipaddr '172.16.1.1'
option netmask '255.255.255.0'
# cat /etc/config/wireless
config wifi-device 'radio0'
option type 'mac80211'
option path 'platform/18000000.wmac'
option band '2g'
option htmode 'HT20'
option cell_density '0'
option country 'CA'
option channel '6'
config wifi-iface 'default_radio0'
option device 'radio0'
option mode 'ap'
option ssid 'guest-wifi'
option key 'REDACTED'
option network 'guest'
option encryption 'psk2'
config wifi-device 'radio1'
option type 'mac80211'
option path '1a143000.pcie/pci0000:00/0000:00:00.0/0000:01:00.0'
option band '5g'
option cell_density '0'
option country 'CA'
option htmode 'HE80'
option channel 'auto'
config wifi-iface 'wifinet4'
option device 'radio0'
option mode 'ap'
option ssid 'deprecated-iot-wifi'
option encryption 'sae-mixed'
option hidden '1'
option key 'REDACTED'
option network 'iot'
config wifi-iface 'wifinet6'
option device 'radio0'
option mode 'ap'
option ssid 'internal-wifi'
option key 'REDACTED'
option network 'lan'
option encryption 'sae-mixed'
config wifi-iface 'wifinet8'
option device 'radio0'
option mode 'ap'
option ssid 'iot-wifi'
option encryption 'psk2'
option key 'REDACTED'
option network 'iot'
config wifi-iface 'wifinet5'
option device 'radio1'
option mode 'ap'
option ssid 'internal-wifi'
option encryption 'sae-mixed'
option key 'REDACTED'
option network 'lan'
# cat /etc/config/dhcp
config dnsmasq
option domainneeded '1'
option localise_queries '1'
option rebind_protection '1'
option rebind_localhost '1'
option local '/lan/'
option domain 'lan'
option expandhosts '1'
option authoritative '1'
option readethers '1'
option leasefile '/tmp/dhcp.leases'
option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
option localservice '1'
option ednspacket_max '1232'
option confdir '/tmp/dnsmasq.d'
list address '/home.lan/home.mydomain.ca/192.168.1.190'
list server '/mask.icloud.com/'
list server '/mask-h2.icloud.com/'
list server '/use-application-dns.net/'
list server '127.0.0.1#5053'
list server '127.0.0.1#5054'
option doh_backup_noresolv '-1'
option noresolv '1'
list doh_backup_server '/mask.icloud.com/'
list doh_backup_server '/mask-h2.icloud.com/'
list doh_backup_server '/use-application-dns.net/'
list doh_backup_server '127.0.0.1#5053'
list doh_backup_server '127.0.0.1#5054'
list doh_server '127.0.0.1#5053'
list doh_server '127.0.0.1#5054'
config dhcp 'lan'
option interface 'lan'
option start '100'
option limit '150'
option leasetime '12h'
option dhcpv4 'server'
option ra 'server'
option dhcpv6 'server'
config dhcp 'wan'
option interface 'wan'
option ignore '1'
list ra_flags 'none'
config odhcpd 'odhcpd'
option maindhcp '0'
option leasefile '/tmp/hosts/odhcpd'
option leasetrigger '/usr/sbin/odhcpd-update'
option loglevel '4'
config dhcp 'iot'
option interface 'iot'
option start '100'
option limit '150'
option leasetime '12h'
config dhcp 'guest'
option interface 'guest'
option start '100'
option limit '150'
option leasetime '12h'
config host
option name 'new-bendesktop'
option ip '192.168.1.190'
option mac 'REDACTED'
config dhcp 'CAMS'
option interface 'CAMS'
option start '100'
option limit '150'
option leasetime '12h'
Note I removed most of my static DHCP lease entries and list address '/domain/ip' mappings from the above to reduce clutter and to not show what services might be running on my network.
# cat /etc/config/firewall
config defaults
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
option flow_offloading '1'
option flow_offloading_hw '1'
config zone 'lan'
option name 'lan'
list network 'lan'
list network 'vpn'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone 'wan'
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config rule
option name 'Support-UDP-Traceroute'
option src 'wan'
option dest_port '33434:33689'
option proto 'udp'
option family 'ipv4'
option target 'REJECT'
option enabled '0'
config include
option path '/etc/firewall.user'
config rule 'wg'
option name 'Allow-WireGuard'
option src 'wan'
option dest_port '51820'
option proto 'udp'
option target 'ACCEPT'
config zone
option name 'guest'
option output 'ACCEPT'
option forward 'REJECT'
option input 'REJECT'
list network 'guest'
config zone
option name 'iot'
option input 'ACCEPT'
option output 'ACCEPT'
list network 'iot'
option forward 'REJECT'
config forwarding
option src 'lan'
option dest 'iot'
config forwarding
option src 'guest'
option dest 'wan'
config rule
option name 'Guest DHCP and DNS'
option src 'guest'
option dest_port '53 67 68'
option target 'ACCEPT'
config rule
option name 'Allow IOT to talk to Home Assistant'
option src 'iot'
list dest_ip '192.168.1.220'
option target 'ACCEPT'
option dest 'lan'
option enabled '0'
config rule
list src_ip '172.16.0.196'
option dest 'wan'
option target 'ACCEPT'
option name 'Allow <device> internet access'
option src 'iot'
option enabled '0'
config rule
option name 'Allow LAN to talk to <device>'
option src 'lan'
option dest 'guest'
list dest_ip '10.10.10.192'
option target 'ACCEPT'
config rule
option name 'Allow phone internet access on IOT network'
option src 'iot'
list src_ip '172.16.0.149'
option dest 'wan'
option target 'ACCEPT'
config redirect
option dest 'lan'
option target 'DNAT'
option src 'wan'
option src_dport '80'
option dest_ip '192.168.1.190'
option dest_port '80'
option src_ip 'REDACTED'
option name 'HTTP - Location X'
config redirect
option dest 'lan'
option target 'DNAT'
option src 'wan'
option src_dport '443'
option dest_ip '192.168.1.190'
option dest_port '443'
option src_ip 'REDACTED'
option name 'HTTPS - Location X'
config zone
option name 'cams'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
list network 'CAMS'
config forwarding
option src 'lan'
option dest 'cams'
config rule
option name 'Cams to Home Assistant'
option src 'cams'
option dest 'lan'
list dest_ip '192.168.1.220'
option target 'ACCEPT'
config rule
option name 'Allow wall panel to talk to Home Assistant'
option src 'iot'
list src_ip '172.16.0.100'
option dest 'lan'
list dest_ip '192.168.1.220'
option target 'ACCEPT'
config redirect
option target 'DNAT'
option name 'Intercept-DNS'
option src 'lan'
option src_dport '53'
The firewall config seems to be including /etc/firewall.user but no such file exists.