Greetings,
I am using OpenWrt 21.02.0 on an RPi4B running Wireguard with VPN bypass, and it works perfectly except for one show: "Wentworth," which displays the dreaded VPN screen of death.
Does anyone have any guidance as to how Netflix does these checks, and if there is any kind of workaround?
I am in Columbus, Ohio, and the VPN PoP is in New York.
My config files are below.
Thanks for you assistance!
John
/etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd09:c84f:a20f::/48'
config device
option name 'wan'
list ports 'eth0.10'
option ipv6 '0'
config interface 'wan'
option proto 'dhcp'
option device 'eth0.10'
option metric '0'
config device
option name 'maint'
list ports 'eth0.56'
option ipv6 '0'
config interface 'maint'
option device 'eth0.56'
option proto 'static'
option ipaddr '192.168.56.30'
option netmask '255.255.255.0'
option defaultroute '0'
config device
option name 'eth0'
option ipv6 '0'
config device
option name 'tun0'
option ipv6 '0'
config device
option name 'eth0.56'
option type '8021q'
option ifname 'eth0'
option vid '56'
option ipv6 '0'
config device
option name 'eth0.10'
option type '8021q'
option ifname 'eth0'
option vid '10'
option ipv6 '0'
config interface 'wg0'
option proto 'wireguard'
option listen_port '51820'
option peerdns '0'
option private_key '4IXtJ'
list addresses '10.13.98.205/24'
list dns '104.223.91.210'
list dns '104.223.91.194'
config wireguard_wg0
option route_allowed_ips '1'
option persistent_keepalive '25'
option endpoint_port '1443'
list allowed_ips '128.0.0.0/1'
list allowed_ips '0.0.0.0/1'
option description 'TorGuard - New York'
option public_key 'bQh'
option endpoint_host '67.213.221.19'
config device
option type '8021q'
option ifname 'eth0'
option vid '52'
option name 'eth0.52'
option ipv6 '0'
config interface 'SSCILAN'
option proto 'static'
option device 'eth0.52'
option ipaddr '192.168.52.1'
option netmask '255.255.255.0'
option type 'bridge'
/etc/config/firewall
config defaults
option input 'ACCEPT'
option output 'ACCEPT'
option synflood_protect '1'
option drop_invalid '1'
option forward 'REJECT'
config zone
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option name 'lan'
list network 'lan'
config zone
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option name 'sscilan'
list network 'SSCILAN'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
list network 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option proto 'esp'
option target 'ACCEPT'
option dest 'lan'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
option dest 'lan'
config rule
option name 'Support-UDP-Traceroute'
option src 'wan'
option dest_port '33434:33689'
option proto 'udp'
option family 'ipv4'
option target 'REJECT'
option enabled '0'
config include
option path '/etc/firewall.user'
config zone
option output 'ACCEPT'
option forward 'REJECT'
option input 'REJECT'
option masq '1'
option mtu_fix '1'
option family 'ipv4'
option name 'ovpn'
list network 'OVPN'
config rule
option name 'Allow-OpenVPN'
list proto 'udp'
option src 'wan'
option target 'ACCEPT'
option family 'ipv4'
option dest 'ovpn'
config forwarding
option src 'lan'
option dest 'ovpn'
config zone
option name 'wg'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
list network 'wg0'
config forwarding
option src 'sscilan'
option dest 'wg'
config rule
option name 'Allow-Wireguard'
list proto 'all'
option src 'wan'
option dest 'wg'
option target 'ACCEPT'