New Build (BS) DD-WRT v3 --- build 33006 08-03-2017

Post new topic   Reply to topic    DD-WRT Forum Index -> Atheros WiSOC based Hardware
Goto page Previous  1, 2, 3, 4, 5
Author Message
Wildlion
DD-WRT Guru


Joined: 24 May 2016
Posts: 1416

PostPosted: Sat Aug 12, 2017 15:35    Post subject: Reply with quote
Router: DIR-615e3
Firmware: dir615e3-firmware.bin (v3.0-r33006 std)
Kernel: Linux 3.10.107 #37311 Thu Aug 3 04:32:23 CEST 2017 mips
Status: Working
Reset: No
Notes on configuration:

    DNSMasq
    Virtual wireless with bridging x2
    multiple DHCP server
    QOS

Errors:

    None





Router: DIR-825 rev B1
Firmware: dir825-firmware.bin (v3.0-r33006 std)
Kernel: Linux 3.10.107 #37293 Thu Aug 3 04:09:31 CEST 2017 mips
Status: Working
Reset: No
Notes on configuration:

    Media Network
    DNSMasq
    Port Forwarding

Errors:


    None



NOTE: With SFE enabled getting same speed as stock firmware!! Very Happy
Sponsor
nmordasov
DD-WRT Novice


Joined: 05 Jun 2016
Posts: 9

PostPosted: Sun Aug 13, 2017 6:59    Post subject: Re: New Build (BS) DD-WRT v3 --- build 33006 08-03-2017 Reply with quote
Router: buffalo wzr-600dhp
Firmware: DD-WRT build 33006 08-03-2017
Kernel: Linux 3.10.107 #37279
Status: OK
Reset: YES
Errors:

OpenVPN Client does not execute script (or execution does not change routes and ip rule):
route-up "/tmp/openvpn-up.sh"
route-pre-down "/tmp/openvpn-down.sh"
down "/tmp/openvpn-down.sh"

The only one that works is (changes routes and ip rule):
up "/tmp/openvpn-up.sh"

I'm using: route-noexec or route-nopull keys

Script preload:

echo '#!/bin/sh
ip route flush table 10
iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
ip route add default dev tun0 table 10
ip rule add from 192.168.1.16/28 table 10"
ip route flush cache
' > /tmp/openvpn-up.sh
chmod +x /tmp/openvpn-down.sh

I'm checking by executing command "ip rule" from administration tab expecting presence "192.168.1.16/28 to 10" in the list

It was working in few months old build, now I tried to upgrade...
mrjcd
DD-WRT Guru


Joined: 31 Jan 2015
Posts: 6291
Location: Texas

PostPosted: Sun Aug 13, 2017 14:25    Post subject: Reply with quote
WRT160NL
DD-WRT v3.0-r33006 std (08/03/17
Linux 3.10.107 #37299 Thu Aug 3 04:20:41 CEST 2017 mips
ovpn client good

----
@nmordasov
Try:
Do away with your script or make changes to it
I haven't seen anything use tun0 in long time .. probably using tun1.
You can check routing table if ovpn client is active.

Recommend:
Use the GUI to setup the ovpn client.
Example: This is what client conf shows when setup thru GUI using r33006.
~: cat /tmp/openvpncl/openvpn.conf
Code:
ca /tmp/openvpncl/ca.crt
cert /tmp/openvpncl/client.crt
key /tmp/openvpncl/client.key
management 127.0.0.1 16
management-log-cache 100
verb 3
mute 3
syslog
writepid /var/run/openvpncl.pid
client
resolv-retry infinite
nobind
persist-key
persist-tun
script-security 2
dev tun1
proto udp4
cipher aes-192-cbc
auth sha256
remote xxxxxxxxx.dyndns.info xxxxx
comp-lzo adaptive
redirect-private def1
route-noexec
tun-mtu 1500
mtu-disc yes
fast-io


Basic nothing special added but policy based routing.
Main setup page DHCP starts 192.168.1.97 -- Max of 30
The 192.168.96/27 covers all clients connected to the router -- they all go thru the tunnel.
You Must Disable 'Shortcut Forwarding Engine' on main page for policy based routing to work

Your config may vary depending on server. I am connected to another dd-wrt router running
ovpn server set to push route & DNS ....not that the pushed DNS makes a difference in this case since
the wrt160nl is behind main router running unbound and all DNS goes thru it ... but that's a different story.
All clients connected to the wrt160nl will show same public IP as what ovpn server router holds.
Hackintosh
DD-WRT User


Joined: 06 Dec 2015
Posts: 54

PostPosted: Tue Aug 15, 2017 2:29    Post subject: Reply with quote
-- WAS --

Router: TPLINK TL-WDR3600 v1.5
Firmware: DD-WRT v3.0-r32170 std (06/01/17)
Kernel: Linux 3.10.105 #32456 Thu Jun 1 03:06:02 CEST 2017 mips
Status: operational
Reset: No (kept settings, standard reboot after update)
Errors: Acceptable --- 5 Ghz light is not on the unit, but is still functioning (WiFi works)


-- NOW ---


Router Model: TPLINK TL-WDR3600 v1.5
Firmware Version: DD-WRT v3.0-r33006 std (08/03/17)
Kernel Version: Linux 3.10.107 #37295 Thu Aug 3 04:17:17 CEST 2017 mips
Status: operational
Reset: No (kept settings, standard reboot after update)
Errors: Acceptable --- 5 Ghz light is not on the unit, but is still functioning (WiFi works)
bp1
DD-WRT Novice


Joined: 08 Feb 2011
Posts: 22

PostPosted: Tue Aug 15, 2017 17:01    Post subject: Reply with quote
TPLINK TL-WR2543
Firmware Version DD-WRT v3.0-r33006 std (08/03/17)
Kernel Version
Linux 3.10.107 #37321 Thu Aug 3 04:37:23 CEST 2017 mips

Status: OK
Reset: No . .
Errors: Access restriction has stopped working

Updated from r29739

Very good upgrade so far except Access Restriction has stopped working in this build.

Reverting back to V29739 and Access Restriction works

_________________
Regards
bp1
mrjcd
DD-WRT Guru


Joined: 31 Jan 2015
Posts: 6291
Location: Texas

PostPosted: Tue Aug 15, 2017 21:54    Post subject: Reply with quote
Linksys E2100L
DD-WRT v3.0-r33006 std (08/03/17)
Linux 3.10.107 #37303 Thu Aug 3 04:23:06 CEST 2017 mips
Previous
DD-WRT v3.0-r27506 (07/09/15) std
Linux 3.10.83 #5662 Thu Jul 9 01:55:29 CEST 2015 mip

updated the WDS-AP & the WDS-Sta
NO Reset .. no changes but to enable Klogd in Services page ....didn't have such a setting in the old firmware
Seems to be working good so far. Same rate as had before.
Both are set to reboot at 03:00 every morning ... twas only way to maintain 100% service with them from
past experience... may rethink that in few days.


r33006 has been very good for all my atheros/QCA devices --- can't say the same on the old broadcom boxes though Rolling Eyes
jmfolcik
DD-WRT User


Joined: 06 Nov 2010
Posts: 125

PostPosted: Wed Aug 16, 2017 23:24    Post subject: Reply with quote
confirming that access restrictions stopped working with this or a recent build. I had a couple non secure http "www.something.com" sites in there and they dont block anymore. I use opendns now though so I could just make personal blocks there, since it wouldn't block https anyway.
Mile-Lile
DD-WRT Guru


Joined: 24 Feb 2013
Posts: 1634
Location: Belgrade

PostPosted: Thu Aug 17, 2017 6:31    Post subject: Reply with quote
jmfolcik wrote:
confirming that access restrictions stopped working with this or a recent build. I had a couple non secure http "www.something.com" sites in there and they dont block anymore. I use opendns now though so I could just make personal blocks there, since it wouldn't block https anyway.



if you still have those rules you can:
Code:
cat /tmp/.ipt

to see if something is "fetched" wrong from GUI...
jmfolcik
DD-WRT User


Joined: 06 Nov 2010
Posts: 125

PostPosted: Sun Aug 20, 2017 21:13    Post subject: Reply with quote
Disabling that new fangled Shortcut Forwarding Engine on the setup page makes the dns access restrictions work again. I don't know if its just me, but it also seems to improve the speed of the management website remotely.
mrjcd
DD-WRT Guru


Joined: 31 Jan 2015
Posts: 6291
Location: Texas

PostPosted: Tue Aug 22, 2017 3:12    Post subject: Reply with quote
mrjcd wrote:
Linksys E2100L
DD-WRT v3.0-r33006 std (08/03/17)
Linux 3.10.107 #37303 Thu Aug 3 04:23:06 CEST 2017 mips
Previous
DD-WRT v3.0-r27506 (07/09/15) std
Linux 3.10.83 #5662 Thu Jul 9 01:55:29 CEST 2015 mip

updated the WDS-AP & the WDS-Sta
NO Reset .. no changes but to enable Klogd in Services page ....didn't have such a setting in the old firmware
Seems to be working good so far. Same rate as had before.
Both are set to reboot at 03:00 every morning ... twas only way to maintain 100% service with them from
past experience... may rethink that in few days.


r33006 has been very good for all my atheros/QCA devices --- can't say the same on the old broadcom boxes though Rolling Eyes

All in all working pretty good but I just don't understand why the station seems forget what the heck its suppose to be doing.
This happens once or twice a day. They are still set to reboot same time once a day.
Not a big deal and wouldn't even notice the 3 second snafu if didn't see log --- it's still irritating.
WDS-AP
Aug 21 08:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 09:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 11:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 12:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 13:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 14:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 15:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 16:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 17:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 18:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 19:13:56 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 IEEE 802.11: authenticated
Aug 21 19:13:56 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 IEEE 802.11: associated (aid 1)
Aug 21 19:13:56 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 RADIUS: starting accounting session 00000008-00000000
Aug 21 19:13:56 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: pairwise key handshake completed (RSN)
Aug 21 20:13:49 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 21:13:50 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 22:13:50 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 21 23:13:50 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 22 00:13:50 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 22 01:13:50 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 22 02:13:50 South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
---
WDS-Sta
Aug 21 19:13:53 North kern.info kernel: [39628.150000] ath0: deauthenticated from 68:7f:74:ac:35:4e (Reason: 2=PREV_AUTH_NOT_VALID)
Aug 21 19:13:56 North kern.info kernel: [39631.000000] ath0: send auth to 68:7f:74:ac:35:4e (try 1/3)
Aug 21 19:13:56 North kern.info kernel: [39631.010000] ath0: authenticated
Aug 21 19:13:56 North kern.info kernel: [39631.020000] ath0: associate with 68:7f:74:ac:35:4e (try 1/3)
Aug 21 19:13:56 North kern.info kernel: [39631.020000] ath0: RX AssocResp from 68:7f:74:ac:35:4e (capab=0x411 status=0 aid=1)
Aug 21 19:13:56 North kern.info kernel: [39631.030000] ath0: associated
Aug 21 19:13:56 North kern.info kernel: [39631.050000] br0: port 3(ath0) entered forwarding state
Aug 21 19:13:56 North kern.info kernel: [39631.050000] br0: port 3(ath0) entered forwarding state
Aug 21 19:13:58 North kern.info kernel: [39633.050000] br0: port 3(ath0) entered forwarding state
EDIT:
If your wondering where the 'Aug 21 10:13:49 group key handshake' is that is another GUI mystery.
I didn't notice till after I posted. It was copied from GUI and that segment of the syslog fell at
a page break and it is NOT shown in the GUI at all.
But it's there when I checked thru terminal Smile ...strange things these days.
bp1
DD-WRT Novice


Joined: 08 Feb 2011
Posts: 22

PostPosted: Tue Aug 22, 2017 10:07    Post subject: Reply with quote
jmfolcik wrote:
Disabling that new fangled Shortcut Forwarding Engine on the setup page makes the dns access restrictions work again. I don't know if its just me, but it also seems to improve the speed of the management website remotely.


Big thanks to jmfolcik for that quick fix for getting access restriction working again in fw 33006. This version seems more better and i will stay on this now that access restriction is working.
Does any one no what the "Shortcut Forwarding Engine" on the setup page does apart from break access restriction.
Many thanks

_________________
Regards
bp1
mrjcd
DD-WRT Guru


Joined: 31 Jan 2015
Posts: 6291
Location: Texas

PostPosted: Tue Aug 22, 2017 13:39    Post subject: Reply with quote
bp1 wrote:
Does any one no what the "Shortcut Forwarding Engine" on the setup page does apart from break access restriction.
Yea, it also breaks ovpn client policy based routing and I think a couple other things Smile
About all I know ... SFE bypasses NAT on established connections. Meaning you do not need
it and you don't want it unless your router cannot handle the rates your ISP gives you.
By all accounts using SFE will give you as fast across the WAN as your router's stock firmware ...some say a bit faster
mrjcd
DD-WRT Guru


Joined: 31 Jan 2015
Posts: 6291
Location: Texas

PostPosted: Wed Aug 23, 2017 23:27    Post subject: Reply with quote
mrjcd wrote:
WNDR3700 V4
DD-WRT v3.0-r33006 std (08/03/17)
Linux 3.18.63 #8197 Thu Aug 3 05:31:57 CEST 2017 mips
Seems recent problems have been fixed.
QOS is good.
Seems to work Ok on test router.
Also installed on WAP + guests unit -- No Reset
Also installed on switch(WiFi disabled) + ovpn server unit -- No Reset
All good.

I have been very pleased with r33006.
Checking logs on the WAP + guests on both radios and it is smooth as silk.
Its current up time is 9 days ... some power blinks here due to stormy weather.
Been running this build since BS built it and am very happy with it on the wndr3700v4.
The other with ovpn server hasn't missed a beat either.
Smile just sharing something good for a change
mrjcd
DD-WRT Guru


Joined: 31 Jan 2015
Posts: 6291
Location: Texas

PostPosted: Wed Aug 30, 2017 3:00    Post subject: Reply with quote
Two E2100L r33006
I know this is really good compared to some older builds but why oh why does the station
enter 'disabled state' for no good reason at all at some odd time.
They both reboot at 03:13 everyday and work great but I just don't know why this
happens --- signal is not the problem.....makes my OCD itch... I just want to fix it.
WDS-Station
Aug 29 08:13:43 WDS-North daemon.debug process_monitor[962]: We need to re-update after 3600 seconds
Aug 29 08:13:43 WDS-North daemon.info process_monitor[962]: set timer: 3600 seconds, callback: ntp_main()
Aug 29 08:13:43 WDS-North user.info : cron : cron daemon successfully started
Aug 29 08:13:43 WDS-North cron.info cron[1085]: (CRON) STARTUP (fork ok)
Aug 29 08:17:32 WDS-North kern.info kernel: [ 248.290000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Aug 29 12:45:29 WDS-North kern.info kernel: [16325.020000] br0: port 3(ath0) entered disabled state
Aug 29 12:45:30 WDS-North kern.info kernel: [16325.960000] ath0: authenticate with 68:7f:74:ac:35:4e
Aug 29 12:45:30 WDS-North kern.info kernel: [16325.990000] ath0: send auth to 68:7f:74:ac:35:4e (try 1/3)
Aug 29 12:45:30 WDS-North kern.info kernel: [16326.000000] ath0: authenticated
Aug 29 12:45:30 WDS-North kern.info kernel: [16326.010000] ath0: associate with 68:7f:74:ac:35:4e (try 1/3)
Aug 29 12:45:30 WDS-North kern.info kernel: [16326.020000] ath0: RX AssocResp from 68:7f:74:ac:35:4e (capab=0x411 status=0 aid=1)
Aug 29 12:45:30 WDS-North kern.info kernel: [16326.020000] ath0: associated
Aug 29 12:45:31 WDS-North kern.info kernel: [16327.040000] br0: port 3(ath0) entered forwarding state
Aug 29 12:45:31 WDS-North kern.info kernel: [16327.040000] br0: port 3(ath0) entered forwarding state
Aug 29 12:45:33 WDS-North kern.info kernel: [16329.040000] br0: port 3(ath0) entered forwarding state
Aug 30 02:40:12 WDS-North auth.info login[5690]: root login on 'pts/0'

-----------------
WDS-AP
Aug 29 08:13:44 WDS-South daemon.debug process_monitor[985]: We need to re-update after 3600 seconds
Aug 29 08:13:44 WDS-South daemon.info process_monitor[985]: set timer: 3600 seconds, callback: ntp_main()
Aug 29 08:13:44 WDS-South user.info : cron : cron daemon successfully started
Aug 29 08:13:44 WDS-South cron.info cron[1082]: (CRON) STARTUP (fork ok)
Aug 29 08:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 08:17:32 WDS-South kern.info kernel: [ 248.410000] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
Aug 29 09:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 10:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 11:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 12:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 12:45:30 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 IEEE 802.11: authenticated
Aug 29 12:45:30 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 IEEE 802.11: associated (aid 1)
Aug 29 12:45:31 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 RADIUS: starting accounting session 00000008-00000000
Aug 29 12:45:31 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: pairwise key handshake completed (RSN)
Aug 29 13:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 14:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 15:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 16:13:45 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 17:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 18:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 19:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 20:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 21:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 22:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 29 23:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 30 00:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 30 01:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 30 02:13:46 WDS-South daemon.info hostapd: ath0: STA 68:7f:74:d7:ba:40 WPA: group key handshake completed (RSN)
Aug 30 02:38:08 WDS-South auth.info login[5695]: root login on 'pts/0'
Goto page Previous  1, 2, 3, 4, 5 Display posts from previous:    Page 5 of 5
Post new topic   Reply to topic    DD-WRT Forum Index -> Atheros WiSOC based Hardware All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum