OpenWrt Forum Archive

Topic: Update on Linksys WRT1900AC support

The content of this topic has been archived between 16 Sep 2014 and 7 May 2018. Unfortunately there are posts – most likely complete pages – missing.

PraxisOne wrote:
JW0914 wrote:
PraxisOne wrote:

Just to confirm, regarding JimWright's 3.5mm mod listed in the wiki, do I require the MAX3232 board if I pick up this TTL-232R-3V3-AJ? I would still need 3.3v in addition though, yes?

No, they're two entirely different things... refer to WRT1900ac Wiki

USB-TTL AJ cables only come with 3 wires... GND, TX, and RX

Sorry to be obtuse, was that a no: I don't require the MAX3232 and can get away with the 3 wires, or a no: I can't actually use the USB-TTL AJ cable at all because they don't have 3.3v wire?
The user from the wiki used DB9-3.5mm cable, which is not exactly quite what I'm after.

Sorry, I should have been more articulate.

You'll be fine with the USB-TTL AJ, as even if you a USB-TTL with all 6 wires, you'd only use GND, TX, and RX. 

The MAX232 is to convert the TTL 3.3v signals to 12v signals for a RS-232 Serial cable

Kaloz wrote:
nyt wrote:

Now, we see proper behavior.  Pressing reset button once no longer completely erases the overlay.

heh? Reset never ever erased anything, it pushed you to recovery.

In trunk, looking at rc.button/reset, it definitely factory resets if you hold it for five seconds.  The broken GPIO states caused the first press to be a released action with SEEN being the timestamp from boot, causing it to trigger the wipe.

root@ZOMGWTFBBQWIFI:/etc/rc.button# cat reset
#!/bin/sh

[ "${ACTION}" = "released" ] || exit 0

. /lib/functions.sh

logger "$BUTTON pressed for $SEEN seconds"

if [ "$SEEN" -lt 1 ]
then
        echo "REBOOT" > /dev/console
        sync
        reboot
elif [ "$SEEN" -gt 5 ]
then
        echo "FACTORY RESET" > /dev/console
        jffs2reset -y && reboot &
fi

(Last edited by nyt on 9 Jul 2015, 21:49)

From the Linksys firmware update --- 1.1.10.. Does anything contained in the bug fixes get passed down?

So I have HTTPS enabled and HTTP disabled for uhttpd... is there a way to make 192.168.1.1 auto load https://192.168.1.1

I know it's possible, as most secure sites will autoload their HTTPS address even if their HTTP address is typed.... I'm just not sure how that works.

JW0914 wrote:

So I have HTTPS enabled and HTTP disabled for uhttpd... is there a way to make 192.168.1.1 auto load https://192.168.1.1

I know it's possible, as most secure sites will autoload their HTTPS address even if their HTTP address is typed.... I'm just not sure how that works.

I think this feature was added in trunk recently

drawz wrote:
JW0914 wrote:

So I have HTTPS enabled and HTTP disabled for uhttpd... is there a way to make 192.168.1.1 auto load https://192.168.1.1

I know it's possible, as most secure sites will autoload their HTTPS address even if their HTTP address is typed.... I'm just not sure how that works.

I think this feature was added in trunk recently

Does that imply that it's not possible in the RC2 build?

Some interesting log output w/ the latest driver... nfc what it means.. very descriptive.

[74696.738459] ieee80211 phy1: interface: 3, change: 0x36
[74700.617870] ieee80211 phy1: result error
[74701.634787] ieee80211 phy1: result error
[74702.648583] ieee80211 phy1: result error
[74703.661758] ieee80211 phy1: result error
[74704.671511] ieee80211 phy1: result error
[74705.680438] ieee80211 phy1: error code: -22
[74705.808453] ieee80211 phy1: result error
[74706.820505] ieee80211 phy1: result error
[74707.831394] ieee80211 phy1: result error
[74708.845964] ieee80211 phy1: result error
[74709.857126] ieee80211 phy1: result error
[74710.863498] ieee80211 phy1: error code: -22
[74711.104413] ieee80211 phy1: result error
[74712.429178] ieee80211 phy1: result error
[74713.449634] ieee80211 phy1: result error
[74714.470253] ieee80211 phy1: result error
[74715.491189] ieee80211 phy1: result error
[74716.507952] ieee80211 phy1: error code: -22
[74716.598578] ieee80211 phy1: result error
[74717.621625] ieee80211 phy1: result error
[74718.638819] ieee80211 phy1: result error
[74719.656188] ieee80211 phy1: result error
[74720.672732] ieee80211 phy1: result error
[74721.690200] ieee80211 phy1: error code: -22
[74721.758647] ieee80211 phy1: result error
[74722.786064] ieee80211 phy1: result error
[74723.801646] ieee80211 phy1: result error
[74724.819480] ieee80211 phy1: result error
[74725.835153] ieee80211 phy1: result error
[74726.847151] ieee80211 phy1: error code: -22
[74727.098073] ieee80211 phy1: result error
[74728.114292] ieee80211 phy1: result error
[74729.126558] ieee80211 phy1: result error
[74730.139287] ieee80211 phy1: result error
[74731.151651] ieee80211 phy1: result error
[74732.162293] ieee80211 phy1: error code: -22
[74732.232858] ieee80211 phy1: result error
[74733.480080] ieee80211 phy1: result error
[74734.488252] ieee80211 phy1: result error
[74735.498064] ieee80211 phy1: result error
[74736.506857] ieee80211 phy1: result error
[74737.511061] ieee80211 phy1: error code: -22
[74737.768056] ieee80211 phy1: result error
[74738.805811] ieee80211 phy1: result error
[74739.820638] ieee80211 phy1: result error
[74740.836030] ieee80211 phy1: result error
[74741.851279] ieee80211 phy1: result error
[74742.863489] ieee80211 phy1: error code: -22
[74742.967990] ieee80211 phy1: result error
[74743.987931] ieee80211 phy1: result error
[74745.005158] ieee80211 phy1: result error
[74746.019143] ieee80211 phy1: result error
[74747.035420] ieee80211 phy1: result error
[74748.048373] ieee80211 phy1: error code: -22
[74748.097552] ieee80211 phy1: result error
[74749.115829] ieee80211 phy1: result error
[74750.127068] ieee80211 phy1: result error
[74751.139651] ieee80211 phy1: result error
[74752.152424] ieee80211 phy1: result error
[74753.163468] ieee80211 phy1: error code: -22
[75429.191968] ieee80211 phy1: result error
[75430.201550] ieee80211 phy1: result error
[75431.210701] ieee80211 phy1: result error
[75432.219727] ieee80211 phy1: result error
[75433.231952] ieee80211 phy1: result error
[75434.238690] ieee80211 phy1: error code: -22
[75790.649040] ieee80211 phy1: result error
[75791.667303] ieee80211 phy1: result error
[75792.683129] ieee80211 phy1: result error
[75793.699435] ieee80211 phy1: result error
[75794.716074] ieee80211 phy1: result error
[75795.724988] ieee80211 phy1: error code: -22
[75802.408911] ieee80211 phy1: result error
[75803.419559] ieee80211 phy1: result error
[75804.428257] ieee80211 phy1: result error
[75805.438004] ieee80211 phy1: result error
[75806.446643] ieee80211 phy1: result error
[75807.451017] ieee80211 phy1: error code: -22
[75911.718238] ieee80211 phy1: result error
[75912.734652] ieee80211 phy1: result error
[75913.748172] ieee80211 phy1: result error
[75914.761104] ieee80211 phy1: result error
[75915.773860] ieee80211 phy1: result error
[75916.781406] ieee80211 phy1: error code: -22
[76047.106903] ieee80211 phy1: result error
[76048.117398] ieee80211 phy1: result error
[76049.125576] ieee80211 phy1: result error
[76050.134012] ieee80211 phy1: result error
[76051.142082] ieee80211 phy1: result error
[76052.145560] ieee80211 phy1: error code: -22
[76052.797347] ieee80211 phy1: result error
[76053.815782] ieee80211 phy1: result error
[76054.834363] ieee80211 phy1: result error
[76055.853575] ieee80211 phy1: result error
[76056.871412] ieee80211 phy1: result error
[76057.881692] ieee80211 phy1: error code: -22
[76239.787090] ieee80211 phy1: interface: 3, change: 0x100
[76239.787136] ieee80211 phy1: wmm:26, rsn:0, rsn48:22, ht:62, vht:21
[76239.808563] ieee80211 phy1: interface: 3, change: 0x36
JW0914 wrote:

@gaga

Instead of waiting for a forum reply, feel free to IM me @ jwm0914 on AIM

It works now!!
I had to set this and now it is working.

/etc/config/openvpn

option tls_server '1'

http://s10.postimg.org/r3gmp0pcp/Capture.png
bild upload

(Last edited by gaga on 10 Jul 2015, 15:34)

Thanks for the OpenVPN update.

gaga wrote:
JW0914 wrote:

@gaga

Instead of waiting for a forum reply, feel free to IM me @ jwm0914 on AIM

It works now!!
I had to set this and now it is working.

http://s10.postimg.org/r3gmp0pcp/Capture.png
bild upload

Interesting... because the line in the config that applies to TLS Auth Server role is

 option tls_auth '/etc/openvpn/keys/nasVPN/ta.key 0'

Can you post the output of cat /etc/config/openvpn as managing the vpn from LuCI re-writes the config file and I'd like to compare your config from yesterday to the new config

JW0914 wrote:

Can you post the output of cat /etc/config/openvpn as managing the vpn from LuCI re-writes the config file and I'd like to compare your config from yesterday to the new config

config openvpn 'VPNserver'
    option enabled '1'
    option dev 'tun0'
    option topology 'subnet'
    option proto 'udp'
    option port '1194'
    option server '10.1.1.0 255.255.255.0'
    option ifconfig '10.1.1.1 255.255.255.0'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1'
    list push 'dhcp-option WINS 192.168.1.1'
    list push 'dhcp-option DNS 8.8.8.8'
    list push 'dhcp-option DNS 8.8.4.4'
    list push 'dhcp-option NTP 129.6.15.30'
    list push 'sndbuf 393216'
    list push 'rcvbuf 393216'
    option cipher 'AES-256-CBC'
    option dh '/etc/openvpn/keys/dh2048.pem'
    option tls_auth '/etc/openvpn/keys/ta.key 0'
    option log '/tmp/openvpn.log'
    option status '/tmp/openvpn-status.log'
    option verb '7'
    option keepalive '10 120'
    option comp_lzo 'yes'
    option client_to_client '1'
    option persist_key '1'
    option persist_tun '1'
    option sndbuf '393216'
    option rcvbuf '393216'
    option fragment '0'
    option mssfix '0'
    option tun_mtu '24000'
    option user 'nobody'
    option group 'nogroup'
    option ca '/etc/openvpn/keys/ca.crt'
    option cert '/etc/openvpn/keys/my-server.crt'
    option key '/etc/openvpn/keys/my-server.key'
    option tls_server '1'

After it worked, I changed to UDP...
As of now I can't access my NAS, though. Need to figure out why...

I have the following setup:

ISP router
192.168.2.1

WRT1900
192.168.2.101
DNS 192.168.2.1
=> Serving as 192.168.1.1 from 192.168.1.2 - 192.168.1.150

NAS
192.168.1.10, DNS: 192.168.1.1

Now I get as a OpenVPN client the IP address 10.1.1.2 and thus, I can't reach my NAS. This is probably only a small issue, but I can't figure out what I need to do.

Any hints?


Scratch that, it's working, sort of. One problem remains: I can't access my SMB shares (Total Commander, ES File Explorer). Through Webbrowser it works, though. What's wrong?

(Last edited by gaga on 10 Jul 2015, 17:55)

gaga wrote:
JW0914 wrote:

Can you post the output of cat /etc/config/openvpn as managing the vpn from LuCI re-writes the config file and I'd like to compare your config from yesterday to the new config

config openvpn 'VPNserver'
    option enabled '1'
    option dev 'tun0'
    option topology 'subnet'
    option proto 'udp'
    option port '1194'
    option server '10.1.1.0 255.255.255.0'
    option ifconfig '10.1.1.1 255.255.255.0'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1'
    list push 'dhcp-option WINS 192.168.1.1'
    list push 'dhcp-option DNS 8.8.8.8'
    list push 'dhcp-option DNS 8.8.4.4'
    list push 'dhcp-option NTP 129.6.15.30'
    list push 'sndbuf 393216'
    list push 'rcvbuf 393216'
    option cipher 'AES-256-CBC'
    option dh '/etc/openvpn/keys/dh2048.pem'
    option tls_auth '/etc/openvpn/keys/ta.key 0'
    option log '/tmp/openvpn.log'
    option status '/tmp/openvpn-status.log'
    option verb '7'
    option keepalive '10 120'
    option comp_lzo 'yes'
    option client_to_client '1'
    option persist_key '1'
    option persist_tun '1'
    option sndbuf '393216'
    option rcvbuf '393216'
    option fragment '0'
    option mssfix '0'
    option tun_mtu '24000'
    option user 'nobody'
    option group 'nogroup'
    option ca '/etc/openvpn/keys/ca.crt'
    option cert '/etc/openvpn/keys/my-server.crt'
    option key '/etc/openvpn/keys/my-server.key'
    option tls_server '1'

After it worked, I changed to UDP...
As of now I can't access my NAS, though. Need to figure out why...

I have the following setup:

ISP router
192.168.2.1

WRT1900
192.168.2.101
DNS 192.168.2.1
=> Serving as 192.168.1.1 from 192.168.1.2 - 192.168.1.150

NAS
192.168.1.10, DNS: 192.168.1.1

Now I get as a OpenVPN client the IP address 10.1.1.2 and thus, I can't reach my NAS. This is probably only a small issue, but I can't figure out what I need to do.

Any hints?

gaga wrote:
JW0914 wrote:

Can you post the output of cat /etc/config/openvpn as managing the vpn from LuCI re-writes the config file and I'd like to compare your config from yesterday to the new config

config openvpn 'VPNserver'
    option enabled '1'
    option dev 'tun0'
    option topology 'subnet'
    option proto 'udp'
    option port '1194'
    option server '10.1.1.0 255.255.255.0'
    option ifconfig '10.1.1.1 255.255.255.0'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1'
    list push 'dhcp-option WINS 192.168.1.1'
    list push 'dhcp-option DNS 8.8.8.8'
    list push 'dhcp-option DNS 8.8.4.4'
    list push 'dhcp-option NTP 129.6.15.30'
    list push 'sndbuf 393216'
    list push 'rcvbuf 393216'
    option cipher 'AES-256-CBC'
    option dh '/etc/openvpn/keys/dh2048.pem'
    option tls_auth '/etc/openvpn/keys/ta.key 0'
    option log '/tmp/openvpn.log'
    option status '/tmp/openvpn-status.log'
    option verb '7'
    option keepalive '10 120'
    option comp_lzo 'yes'
    option client_to_client '1'
    option persist_key '1'
    option persist_tun '1'
    option sndbuf '393216'
    option rcvbuf '393216'
    option fragment '0'
    option mssfix '0'
    option tun_mtu '24000'
    option user 'nobody'
    option group 'nogroup'
    option ca '/etc/openvpn/keys/ca.crt'
    option cert '/etc/openvpn/keys/my-server.crt'
    option key '/etc/openvpn/keys/my-server.key'
    option tls_server '1'

As of now I can't access my NAS, though. Need to figure out why...

I wonder why option tls_server '1' needed to be added.

From the OpenVPN Man Page (search page for tls-server)

--tls-server  Enable TLS and assume server role during TLS handshake. Note that OpenVPN is designed as a peer-to-peer application. The designation of client or server is only for the purpose of negotiating the TLS control channel.

--tls-client  Enable TLS and assume client role during TLS handshake.


I'll add that as a annotation to the Wiki, and research why one would have to physically specify tls-server in a non-production environment... unless you re-created your certificates without build-key-server, as that's what specifies the VPN server certificate as a server config, along with ta.key 0/1

Running trunk ver 46262 called 46263 according to buildbot. First cpu stall I have seen. If anyone is interested here is a link.

https://onedrive.live.com/redir?resid=E … file%2ctxt

build 46131 did not do this but it really ate the memory. I will have to try another build at least it seems like collectd was working for a change. This build went down yesterday also but everything locked tight no access. It seemed to last about 16 hrs both times.

northbound wrote:

Running trunk ver 46262 called 46263 according to buildbot. First cpu stall I have seen. If anyone is interested here is a link.

https://onedrive.live.com/redir?resid=E … file%2ctxt

build 46131 did not do this but it really ate the memory. I will have to try another build at least it seems like collectd was working for a change. This build went down yesterday also but everything locked tight no access. It seemed to last about 16 hrs both times.

I'm on RC2, and had a CPU stall about 3 days ago. After doing some research, I thought it was a issue already patched, but there hasn't been confirmation from anyone either way.

At least it gives me a chance to see if the latest stock firmware flashes correctly.

northbound wrote:

At least it gives me a chance to see if the latest stock firmware flashes correctly.

That's important because of the 1.1.9 issue.  If you are able to flash directly to 1.1.10, then the wiki needs updating.

davidc502 wrote:
northbound wrote:

At least it gives me a chance to see if the latest stock firmware flashes correctly.

That's important because of the 1.1.9 issue.  If you are able to flash directly to 1.1.10, then the wiki needs updating.


Yep, I remember your comment about that. I will try to install it when I get home from work in a couple of hrs. I have not seen any comments about anyone else trying it yet.

JW0914 wrote:
gaga wrote:
JW0914 wrote:

Can you post the output of cat /etc/config/openvpn as managing the vpn from LuCI re-writes the config file and I'd like to compare your config from yesterday to the new config

config openvpn 'VPNserver'
    option enabled '1'
    option dev 'tun0'
    option topology 'subnet'
    option proto 'udp'
    option port '1194'
    option server '10.1.1.0 255.255.255.0'
    option ifconfig '10.1.1.1 255.255.255.0'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1'
    list push 'dhcp-option WINS 192.168.1.1'
    list push 'dhcp-option DNS 8.8.8.8'
    list push 'dhcp-option DNS 8.8.4.4'
    list push 'dhcp-option NTP 129.6.15.30'
    list push 'sndbuf 393216'
    list push 'rcvbuf 393216'
    option cipher 'AES-256-CBC'
    option dh '/etc/openvpn/keys/dh2048.pem'
    option tls_auth '/etc/openvpn/keys/ta.key 0'
    option log '/tmp/openvpn.log'
    option status '/tmp/openvpn-status.log'
    option verb '7'
    option keepalive '10 120'
    option comp_lzo 'yes'
    option client_to_client '1'
    option persist_key '1'
    option persist_tun '1'
    option sndbuf '393216'
    option rcvbuf '393216'
    option fragment '0'
    option mssfix '0'
    option tun_mtu '24000'
    option user 'nobody'
    option group 'nogroup'
    option ca '/etc/openvpn/keys/ca.crt'
    option cert '/etc/openvpn/keys/my-server.crt'
    option key '/etc/openvpn/keys/my-server.key'
    option tls_server '1'

After it worked, I changed to UDP...
As of now I can't access my NAS, though. Need to figure out why...

I have the following setup:

ISP router
192.168.2.1

WRT1900
192.168.2.101
DNS 192.168.2.1
=> Serving as 192.168.1.1 from 192.168.1.2 - 192.168.1.150

NAS
192.168.1.10, DNS: 192.168.1.1

Now I get as a OpenVPN client the IP address 10.1.1.2 and thus, I can't reach my NAS. This is probably only a small issue, but I can't figure out what I need to do.

Any hints?

gaga wrote:
JW0914 wrote:

Can you post the output of cat /etc/config/openvpn as managing the vpn from LuCI re-writes the config file and I'd like to compare your config from yesterday to the new config

config openvpn 'VPNserver'
    option enabled '1'
    option dev 'tun0'
    option topology 'subnet'
    option proto 'udp'
    option port '1194'
    option server '10.1.1.0 255.255.255.0'
    option ifconfig '10.1.1.1 255.255.255.0'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1'
    list push 'dhcp-option WINS 192.168.1.1'
    list push 'dhcp-option DNS 8.8.8.8'
    list push 'dhcp-option DNS 8.8.4.4'
    list push 'dhcp-option NTP 129.6.15.30'
    list push 'sndbuf 393216'
    list push 'rcvbuf 393216'
    option cipher 'AES-256-CBC'
    option dh '/etc/openvpn/keys/dh2048.pem'
    option tls_auth '/etc/openvpn/keys/ta.key 0'
    option log '/tmp/openvpn.log'
    option status '/tmp/openvpn-status.log'
    option verb '7'
    option keepalive '10 120'
    option comp_lzo 'yes'
    option client_to_client '1'
    option persist_key '1'
    option persist_tun '1'
    option sndbuf '393216'
    option rcvbuf '393216'
    option fragment '0'
    option mssfix '0'
    option tun_mtu '24000'
    option user 'nobody'
    option group 'nogroup'
    option ca '/etc/openvpn/keys/ca.crt'
    option cert '/etc/openvpn/keys/my-server.crt'
    option key '/etc/openvpn/keys/my-server.key'
    option tls_server '1'

As of now I can't access my NAS, though. Need to figure out why...

I wonder why option tls_server '1' needed to be added.

From the OpenVPN Man Page (search page for tls-server)

--tls-server  Enable TLS and assume server role during TLS handshake. Note that OpenVPN is designed as a peer-to-peer application. The designation of client or server is only for the purpose of negotiating the TLS control channel.

--tls-client  Enable TLS and assume client role during TLS handshake.


I'll add that as a annotation to the Wiki, and research why one would have to physically specify tls-server in a non-production environment... unless you re-created your certificates without build-key-server, as that's what specifies the VPN server certificate as a server config, along with ta.key 0/1


What is your VPN performance?
What transfers do you get?

In failsafe mode ...

Can I just:

rm -r /overlay/*

Then setup the router again.

Thanks.

@kaloz did you have a chance to look at this?


nyt wrote:
Kaloz wrote:
nyt wrote:

Now, we see proper behavior.  Pressing reset button once no longer completely erases the overlay.

heh? Reset never ever erased anything, it pushed you to recovery.

In trunk, looking at rc.button/reset, it definitely factory resets if you hold it for five seconds.  The broken GPIO states caused the first press to be a released action with SEEN being the timestamp from boot, causing it to trigger the wipe.

root@ZOMGWTFBBQWIFI:/etc/rc.button# cat reset
#!/bin/sh

[ "${ACTION}" = "released" ] || exit 0

. /lib/functions.sh

logger "$BUTTON pressed for $SEEN seconds"

if [ "$SEEN" -lt 1 ]
then
        echo "REBOOT" > /dev/console
        sync
        reboot
elif [ "$SEEN" -gt 5 ]
then
        echo "FACTORY RESET" > /dev/console
        jffs2reset -y && reboot &
fi
davidc502 wrote:
northbound wrote:

At least it gives me a chance to see if the latest stock firmware flashes correctly.

That's important because of the 1.1.9 issue.  If you are able to flash directly to 1.1.10, then the wiki needs updating.

Confirmed.
Update 1.1.10 will flash properly from OpenWrt and it also picked up the my settings for factory firmware......Now to see if anything is fixed on today's trunk build.

northbound wrote:
davidc502 wrote:
northbound wrote:

At least it gives me a chance to see if the latest stock firmware flashes correctly.

That's important because of the 1.1.9 issue.  If you are able to flash directly to 1.1.10, then the wiki needs updating.

Confirmed.
Update 1.1.10 will flash properly from OpenWrt and it also picked up the my settings for factory firmware......Now to see if anything is fixed on today's trunk build.

Appreciate the confirmation. The wiki has been updated.

Over the past 3 days, I've just got the router tuned right where I want it, so I'm not touching anything! smile  Well, until the next big update. lol

belliash wrote:
JW0914 wrote:
gaga wrote:
config openvpn 'VPNserver'
    option enabled '1'
    option dev 'tun0'
    option topology 'subnet'
    option proto 'udp'
    option port '1194'
    option server '10.1.1.0 255.255.255.0'
    option ifconfig '10.1.1.1 255.255.255.0'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1'
    list push 'dhcp-option WINS 192.168.1.1'
    list push 'dhcp-option DNS 8.8.8.8'
    list push 'dhcp-option DNS 8.8.4.4'
    list push 'dhcp-option NTP 129.6.15.30'
    list push 'sndbuf 393216'
    list push 'rcvbuf 393216'
    option cipher 'AES-256-CBC'
    option dh '/etc/openvpn/keys/dh2048.pem'
    option tls_auth '/etc/openvpn/keys/ta.key 0'
    option log '/tmp/openvpn.log'
    option status '/tmp/openvpn-status.log'
    option verb '7'
    option keepalive '10 120'
    option comp_lzo 'yes'
    option client_to_client '1'
    option persist_key '1'
    option persist_tun '1'
    option sndbuf '393216'
    option rcvbuf '393216'
    option fragment '0'
    option mssfix '0'
    option tun_mtu '24000'
    option user 'nobody'
    option group 'nogroup'
    option ca '/etc/openvpn/keys/ca.crt'
    option cert '/etc/openvpn/keys/my-server.crt'
    option key '/etc/openvpn/keys/my-server.key'
    option tls_server '1'

After it worked, I changed to UDP...
As of now I can't access my NAS, though. Need to figure out why...

I have the following setup:

ISP router
192.168.2.1

WRT1900
192.168.2.101
DNS 192.168.2.1
=> Serving as 192.168.1.1 from 192.168.1.2 - 192.168.1.150

NAS
192.168.1.10, DNS: 192.168.1.1

Now I get as a OpenVPN client the IP address 10.1.1.2 and thus, I can't reach my NAS. This is probably only a small issue, but I can't figure out what I need to do.

Any hints?

gaga wrote:
config openvpn 'VPNserver'
    option enabled '1'
    option dev 'tun0'
    option topology 'subnet'
    option proto 'udp'
    option port '1194'
    option server '10.1.1.0 255.255.255.0'
    option ifconfig '10.1.1.1 255.255.255.0'
    list push 'route 192.168.1.0 255.255.255.0'
    list push 'dhcp-option DNS 192.168.1.1'
    list push 'dhcp-option WINS 192.168.1.1'
    list push 'dhcp-option DNS 8.8.8.8'
    list push 'dhcp-option DNS 8.8.4.4'
    list push 'dhcp-option NTP 129.6.15.30'
    list push 'sndbuf 393216'
    list push 'rcvbuf 393216'
    option cipher 'AES-256-CBC'
    option dh '/etc/openvpn/keys/dh2048.pem'
    option tls_auth '/etc/openvpn/keys/ta.key 0'
    option log '/tmp/openvpn.log'
    option status '/tmp/openvpn-status.log'
    option verb '7'
    option keepalive '10 120'
    option comp_lzo 'yes'
    option client_to_client '1'
    option persist_key '1'
    option persist_tun '1'
    option sndbuf '393216'
    option rcvbuf '393216'
    option fragment '0'
    option mssfix '0'
    option tun_mtu '24000'
    option user 'nobody'
    option group 'nogroup'
    option ca '/etc/openvpn/keys/ca.crt'
    option cert '/etc/openvpn/keys/my-server.crt'
    option key '/etc/openvpn/keys/my-server.key'
    option tls_server '1'

As of now I can't access my NAS, though. Need to figure out why...

I wonder why option tls_server '1' needed to be added.

From the OpenVPN Man Page (search page for tls-server)

--tls-server  Enable TLS and assume server role during TLS handshake. Note that OpenVPN is designed as a peer-to-peer application. The designation of client or server is only for the purpose of negotiating the TLS control channel.

--tls-client  Enable TLS and assume client role during TLS handshake.


I'll add that as a annotation to the Wiki, and research why one would have to physically specify tls-server in a non-production environment... unless you re-created your certificates without build-key-server, as that's what specifies the VPN server certificate as a server config, along with ta.key 0/1


What is your VPN performance?
What transfers do you get?

On my LG G4: ~30mbit/s

davidc502 wrote:
northbound wrote:
davidc502 wrote:

That's important because of the 1.1.9 issue.  If you are able to flash directly to 1.1.10, then the wiki needs updating.

Confirmed.
Update 1.1.10 will flash properly from OpenWrt and it also picked up the my settings for factory firmware......Now to see if anything is fixed on today's trunk build.

Appreciate the confirmation. The wiki has been updated.

Over the past 3 days, I've just got the router tuned right where I want it, so I'm not touching anything! smile  Well, until the next big update. lol

I like seeing changes I don't have others breathing down my neck when I am playing and the network is down. smile  like I saw in a previous post the trunk is a wee bit unstable. <bseg> Things like the buildbot calling todays trunk build is 46290 yet it is 46288. But it is better than some of the builds I have seen from win 10. LOL!

(Last edited by northbound on 11 Jul 2015, 00:21)

gaga wrote:
belliash wrote:
JW0914 wrote:

I wonder why option tls_server '1' needed to be added.

From the OpenVPN Man Page (search page for tls-server)

--tls-server  Enable TLS and assume server role during TLS handshake. Note that OpenVPN is designed as a peer-to-peer application. The designation of client or server is only for the purpose of negotiating the TLS control channel.

--tls-client  Enable TLS and assume client role during TLS handshake.


I'll add that as a annotation to the Wiki, and research why one would have to physically specify tls-server in a non-production environment... unless you re-created your certificates without build-key-server, as that's what specifies the VPN server certificate as a server config, along with ta.key 0/1


What is your VPN performance?
What transfers do you get?

On my LG G4: ~30mbit/s


Interesting.
All I got here is about 12mbps