New Kong's build: DD-WRT v3.0-r31830M kongac (04/08/17)

Post new topic   Reply to topic    DD-WRT Forum Index -> Broadcom SoC based Hardware
Goto page Previous  1, 2, 3
Author Message
kallsop
DD-WRT User


Joined: 10 Apr 2008
Posts: 135

PostPosted: Sat Apr 15, 2017 4:14    Post subject: Reply with quote
R7000: after 3 days uptime, lost 2.4GHz and 5GHz WiFi, had to power cycle. There are no wired connections, can't say if the LAN ports were dead.

Possibly a coincidence, the WiFi seemed to stop at exactly midnight. I don't have any access timers set up.
Sponsor
wabe
DD-WRT Guru


Joined: 17 Jun 2006
Posts: 889

PostPosted: Sat Apr 15, 2017 11:55    Post subject: Reply with quote
This build is running without issues on ASUS RT-AC68U rev.B
Used ddup --flash-latest without resetting. Current uptime > 3 days

Openvpn, samba, port forwarding works, no wifi issues

_________________
Netgear R7000 on Build 55109
Asus AC-AC68U rev. C1 (AP) on Build 55109
Asus AC-68U rev. A1 on Build 54604
Asus AC-68U rev. A1 on Build 53339
tmo1138
DD-WRT User


Joined: 24 Mar 2015
Posts: 175
Location: Tacoma, Wa

PostPosted: Mon Apr 17, 2017 5:08    Post subject: Reply with quote
WJames wrote:
This build has been up for just over two days. Overall, it has been very solid. However, I have seen one OpenVPN "disconnect" with this build. Actually, Windows still shows an active VPN connection, but I cannot access any web sites or intranet computers. I have experienced this issue from time to time with the past few builds. Disconnecting and then re-connecting usually fixes the issue. *Shrug*


I saw the same thing here with my R8000. After two days *poof* no VPN..

I'll try updating to the newest build and see what happens.

_________________
Routers:
Netgear R8000 - DD-WRT v3.0-r43420 std (06/15/20)
Netgear R9000 - DD-WRT v3.0-r43420 std (06/15/20)


Useful links:

Builds:
ftp://ftp.dd-wrt.com/betas/2020/


dd-wrt supported devices:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices

So long <kong> and thanks for all the fish!
<Kong>
DD-WRT Guru


Joined: 15 Dec 2010
Posts: 4339
Location: Germany

PostPosted: Mon Apr 17, 2017 6:55    Post subject: Reply with quote
tmo1138 wrote:
WJames wrote:
This build has been up for just over two days. Overall, it has been very solid. However, I have seen one OpenVPN "disconnect" with this build. Actually, Windows still shows an active VPN connection, but I cannot access any web sites or intranet computers. I have experienced this issue from time to time with the past few builds. Disconnecting and then re-connecting usually fixes the issue. *Shrug*


I saw the same thing here with my R8000. After two days *poof* no VPN..

I'll try updating to the newest build and see what happens.


The new build has comes with openvpn 2.4.1, maybe it helps, if not, checkout /var/log/messages and the syslog output on the vpn status tab.

_________________
KONG PB's: http://www.desipro.de/ddwrt/
KONG Info: http://tips.desipro.de/
tmo1138
DD-WRT User


Joined: 24 Mar 2015
Posts: 175
Location: Tacoma, Wa

PostPosted: Mon Apr 17, 2017 21:46    Post subject: Reply with quote
<Kong> wrote:
tmo1138 wrote:
WJames wrote:
This build has been up for just over two days. Overall, it has been very solid. However, I have seen one OpenVPN "disconnect" with this build. Actually, Windows still shows an active VPN connection, but I cannot access any web sites or intranet computers. I have experienced this issue from time to time with the past few builds. Disconnecting and then re-connecting usually fixes the issue. *Shrug*


I saw the same thing here with my R8000. After two days *poof* no VPN..

I'll try updating to the newest build and see what happens.


The new build has comes with openvpn 2.4.1, maybe it helps, if not, checkout /var/log/messages and the syslog output on the vpn status tab.


OpenVPN died again.. I'm running the syslogd now and I'll share logs for you to look at when it happens again.. Smile

_________________
Routers:
Netgear R8000 - DD-WRT v3.0-r43420 std (06/15/20)
Netgear R9000 - DD-WRT v3.0-r43420 std (06/15/20)


Useful links:

Builds:
ftp://ftp.dd-wrt.com/betas/2020/


dd-wrt supported devices:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices

So long <kong> and thanks for all the fish!
tmo1138
DD-WRT User


Joined: 24 Mar 2015
Posts: 175
Location: Tacoma, Wa

PostPosted: Tue Apr 18, 2017 21:58    Post subject: Reply with quote
@Kong

Here's what I saw from the logs.. essentially authorization on a reconnect is failing even tho the credentials haven't changed..

Code:
Apr 17 21:24:30 R8000 daemon.notice openvpn[11100]: MANAGEMENT: Client disconnected
Apr 17 21:44:45 R8000 daemon.notice openvpn[11100]: TLS: soft reset sec=-1 bytes=49348/-1 pkts=705/0
Apr 17 21:44:45 R8000 daemon.notice openvpn[11100]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
Apr 17 21:44:45 R8000 daemon.notice openvpn[11100]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=1f77c08192e5093eefb056ea0389cb0b, name=1f77c08192e5093eefb056ea0389cb0b
Apr 17 21:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 17 21:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 17 21:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 17 21:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 17 21:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 17 21:44:45 R8000 daemon.notice openvpn[11100]: NOTE: --mute triggered...
Apr 17 22:44:45 R8000 daemon.notice openvpn[11100]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Apr 17 22:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 17 22:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 17 22:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 17 22:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 17 22:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 17 22:44:45 R8000 daemon.notice openvpn[11100]: NOTE: --mute triggered...
Apr 17 23:44:45 R8000 daemon.notice openvpn[11100]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Apr 17 23:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 17 23:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 17 23:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 17 23:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 17 23:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 17 23:44:45 R8000 daemon.notice openvpn[11100]: NOTE: --mute triggered...
Apr 17 23:59:38 R8000 user.debug : ttraff: data for 17-4-2017 commited to nvram
Apr 18 00:44:45 R8000 daemon.notice openvpn[11100]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Apr 18 00:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 18 00:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 18 00:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 00:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 18 00:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 00:44:45 R8000 daemon.notice openvpn[11100]: NOTE: --mute triggered...
Apr 18 01:44:45 R8000 daemon.notice openvpn[11100]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Apr 18 01:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 18 01:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 18 01:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 01:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 18 01:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 01:44:45 R8000 daemon.notice openvpn[11100]: NOTE: --mute triggered...
Apr 18 02:44:45 R8000 daemon.notice openvpn[11100]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Apr 18 02:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 18 02:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 18 02:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 02:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 18 02:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 02:44:45 R8000 daemon.notice openvpn[11100]: NOTE: --mute triggered...
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Apr 18 03:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 18 03:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 03:44:45 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Apr 18 03:44:45 R8000 daemon.notice openvpn[11100]: NOTE: --mute triggered...
Apr 18 04:36:33 R8000 daemon.notice openvpn[11100]: 2 variation(s) on previous 3 message(s) suppressed by --mute
Apr 18 04:36:33 R8000 daemon.notice openvpn[11100]: [1f77c08192e5093eefb056ea0389cb0b] Inactivity timeout (--ping-restart), restarting
Apr 18 04:36:33 R8000 daemon.notice openvpn[11100]: SIGUSR1[soft,ping-restart] received, process restarting
Apr 18 04:36:33 R8000 daemon.notice openvpn[11100]: Restart pause, 5 second(s)
Apr 18 04:36:38 R8000 daemon.warn openvpn[11100]: WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.h
tml#mitm for more info.
Apr 18 04:36:38 R8000 daemon.warn openvpn[11100]: NOTE: the current --script-security setting may allow this configuration to call user-defined script
s
Apr 18 04:36:38 R8000 daemon.notice openvpn[11100]: TCP/UDP: Preserving recently used remote address: [AF_INET]104.200.154.47:1198
Apr 18 04:36:38 R8000 daemon.notice openvpn[11100]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Apr 18 04:36:38 R8000 daemon.notice openvpn[11100]: UDPv4 link local: (not bound)
Apr 18 04:36:38 R8000 daemon.notice openvpn[11100]: UDPv4 link remote: [AF_INET]104.200.154.47:1198
Apr 18 04:36:38 R8000 daemon.notice openvpn[11100]: TLS: Initial packet from [AF_INET]104.200.154.47:1198, sid=5bd4249c f51f3bda
Apr 18 04:36:38 R8000 daemon.notice openvpn[11100]: VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Acce
ss, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
Apr 18 04:36:38 R8000 daemon.notice openvpn[11100]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Acce
ss, CN=1f77c08192e5093eefb056ea0389cb0b, name=1f77c08192e5093eefb056ea0389cb0b
Apr 18 04:36:39 R8000 daemon.warn openvpn[11100]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
Apr 18 04:36:39 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
Apr 18 04:36:39 R8000 daemon.notice openvpn[11100]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Apr 18 04:36:39 R8000 daemon.notice openvpn[11100]: [1f77c08192e5093eefb056ea0389cb0b] Peer Connection Initiated with [AF_INET]104.200.154.47:1198
Apr 18 04:36:40 R8000 daemon.notice openvpn[11100]: SENT CONTROL [1f77c08192e5093eefb056ea0389cb0b]: 'PUSH_REQUEST' (status=1)
Apr 18 04:36:40 R8000 daemon.notice openvpn[11100]: AUTH: Received control message: AUTH_FAILED
Apr 18 04:36:40 R8000 daemon.notice openvpn[11100]: /tmp/openvpncl/route-down.sh tun1 1500 1622 10.73.10.6 10.73.10.5 init
Apr 18 04:36:40 R8000 daemon.notice openvpn[11100]: Closing TUN/TAP interface
Apr 18 04:36:40 R8000 daemon.notice openvpn[11100]: /sbin/ifconfig tun1 0.0.0.0
Apr 18 04:36:40 R8000 daemon.notice openvpn[11100]: SIGTERM[soft,auth-failure] received, process exiting

_________________
Routers:
Netgear R8000 - DD-WRT v3.0-r43420 std (06/15/20)
Netgear R9000 - DD-WRT v3.0-r43420 std (06/15/20)


Useful links:

Builds:
ftp://ftp.dd-wrt.com/betas/2020/


dd-wrt supported devices:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices

So long <kong> and thanks for all the fish!
<Kong>
DD-WRT Guru


Joined: 15 Dec 2010
Posts: 4339
Location: Germany

PostPosted: Wed Apr 19, 2017 6:17    Post subject: Reply with quote
Apr 18 04:36:39 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'

Wrong cipher. If you don't receive this message when you first connect, then it is likely, that something changed on the server side between first and reconnect, but the error is clear.

_________________
KONG PB's: http://www.desipro.de/ddwrt/
KONG Info: http://tips.desipro.de/
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12917
Location: Netherlands

PostPosted: Wed Apr 19, 2017 9:20    Post subject: Reply with quote
I do not have any disconnections but receive the same warning on first and subsequent connect, it is a PIA thing, which is maybe not related to the problem as I do not have any disconnections.
_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
tmo1138
DD-WRT User


Joined: 24 Mar 2015
Posts: 175
Location: Tacoma, Wa

PostPosted: Thu Apr 20, 2017 3:24    Post subject: Reply with quote
<Kong> wrote:
Apr 18 04:36:39 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'

Wrong cipher. If you don't receive this message when you first connect, then it is likely, that something changed on the server side between first and reconnect, but the error is clear.


That's really strange.. you're right.. that's exactly the warning.. but it doesn't make sense why... I'm using the correct certs, port and encryption type.. And I just double-checked the settings.. I checked using 'nvram show' and the nvram settings even show the right cipher:

Code:

openvpncl_cipher=aes-128-cbc



pia-ddwrt.jpg
 Description:
 Filesize:  96.05 KB
 Viewed:  7317 Time(s)

pia-ddwrt.jpg



_________________
Routers:
Netgear R8000 - DD-WRT v3.0-r43420 std (06/15/20)
Netgear R9000 - DD-WRT v3.0-r43420 std (06/15/20)


Useful links:

Builds:
ftp://ftp.dd-wrt.com/betas/2020/


dd-wrt supported devices:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices

So long <kong> and thanks for all the fish!
tmo1138
DD-WRT User


Joined: 24 Mar 2015
Posts: 175
Location: Tacoma, Wa

PostPosted: Thu Apr 20, 2017 3:34    Post subject: Reply with quote
@Kong

Apparently others have had this issue and when they fell back to r30840M the problem went away..

https://www.dd-wrt.com/phpBB2/viewtopic.php?t=306775&sid=7bead40e7ad6e0cc51e22f5a301360d6

_________________
Routers:
Netgear R8000 - DD-WRT v3.0-r43420 std (06/15/20)
Netgear R9000 - DD-WRT v3.0-r43420 std (06/15/20)


Useful links:

Builds:
ftp://ftp.dd-wrt.com/betas/2020/


dd-wrt supported devices:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices

So long <kong> and thanks for all the fish!
<Kong>
DD-WRT Guru


Joined: 15 Dec 2010
Posts: 4339
Location: Germany

PostPosted: Thu Apr 20, 2017 6:00    Post subject: Reply with quote
tmo1138 wrote:
<Kong> wrote:
Apr 18 04:36:39 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'

Wrong cipher. If you don't receive this message when you first connect, then it is likely, that something changed on the server side between first and reconnect, but the error is clear.


That's really strange.. you're right.. that's exactly the warning.. but it doesn't make sense why... I'm using the correct certs, port and encryption type.. And I just double-checked the settings.. I checked using 'nvram show' and the nvram settings even show the right cipher:

Code:

openvpncl_cipher=aes-128-cbc


You set the wrong cipher, can't you read?

The server uses blowfish on the port you are using, it is possible to run multiple instances on a server, that uses different encryption settings. It is also possible, that there is a load balancer that directs you to different servers where one of their servers is configured badly.

Just use a different server or port. Usually if a provider uses different settings as in his guide, then their server is not correctly configured and most likely other settings are bad as well.

_________________
KONG PB's: http://www.desipro.de/ddwrt/
KONG Info: http://tips.desipro.de/
tmo1138
DD-WRT User


Joined: 24 Mar 2015
Posts: 175
Location: Tacoma, Wa

PostPosted: Thu Apr 20, 2017 14:39    Post subject: Reply with quote
<Kong> wrote:
tmo1138 wrote:
<Kong> wrote:
Apr 18 04:36:39 R8000 daemon.warn openvpn[11100]: WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'

Wrong cipher. If you don't receive this message when you first connect, then it is likely, that something changed on the server side between first and reconnect, but the error is clear.


That's really strange.. you're right.. that's exactly the warning.. but it doesn't make sense why... I'm using the correct certs, port and encryption type.. And I just double-checked the settings.. I checked using 'nvram show' and the nvram settings even show the right cipher:

Code:

openvpncl_cipher=aes-128-cbc


You set the wrong cipher, can't you read?

The server uses blowfish on the port you are using, it is possible to run multiple instances on a server, that uses different encryption settings. It is also possible, that there is a load balancer that directs you to different servers where one of their servers is configured badly.

Just use a different server or port. Usually if a provider uses different settings as in his guide, then their server is not correctly configured and most likely other settings are bad as well.



I can read just fine.. I'm not being obtuse and I'm not an idiot. Now maybe PIA are being idiots and I need to take my business to someone else.. *I* did not set the wrong cipher based on their documentation.. and I read and RE-read it just to be sure.

Sorry to be a bother.. I'll find out what PIA is doing and share for others here.

In their own documentation they say to set for that port as follows:

Port: 1198
Protocol :UDP
Cipher: AES-128-CBC
Hash: SHA1

https://helpdesk.privateinternetaccess.com/hc/en-us/articles/225274288-Which-encryption-auth-settings-should-I-use-for-ports-on-your-gateways-



tmo1138 can read just fine.jpg
 Description:
 Filesize:  75.41 KB
 Viewed:  7208 Time(s)

tmo1138 can read just fine.jpg



_________________
Routers:
Netgear R8000 - DD-WRT v3.0-r43420 std (06/15/20)
Netgear R9000 - DD-WRT v3.0-r43420 std (06/15/20)


Useful links:

Builds:
ftp://ftp.dd-wrt.com/betas/2020/


dd-wrt supported devices:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices

So long <kong> and thanks for all the fish!
tmo1138
DD-WRT User


Joined: 24 Mar 2015
Posts: 175
Location: Tacoma, Wa

PostPosted: Sat Apr 22, 2017 22:24    Post subject: Reply with quote
@Kong

I tried changing to Blowfish for the Cipher and still had the same problem: Eventually VPN would disconnect, the logs would show that auth failed and the connection would drop exactly like in the logs above:

Code:
R8000 daemon.notice openvpn[11100]: SIGTERM[soft,auth-failure] received, process exiting


In another thread someone mentioned a config change which I tried and the problem is now solved - for me, anyway.. if VPN does disconnect, I'm able to re-authenticate regardless of cipher.

http://www.dd-wrt.com/phpBB2/viewtopic.php?p=1076294#1076294

For the sake of completeness, what I said there is that I made these changes:

In Administration | Commands run the following code - substituting my credentials for UNAME and PWD
Code:

echo UNAME > /tmp/password.txt
echo PWD >> /tmp/password.txt


In returning to Services | VPN I did the following:

Configured the appropriate port (1198) Device (TUN) Proto (UDP) and Cipher (this time AES-128 CBC)

Disabled User Pass Authentication
Put these lines in Additional Config
Code:

auth-user-pass /tmp/password.txt
persist-key
persist-tun
tls-client
remote-cert-tls server
ping 10
ping-restart 120


And I made sure the CA Cert matched it.



I don't know specifically when I started seeing this problem but my best recollection is that it was with one of the prior 3 or 4 builds. Prior to a few weeks ago I had no problems with PIA reconnections failing on dd-wrt - that I know for sure. I have no idea if this is PrivateInternet, a bug in OpenVPN.. something going on with dd-wrt.. or what. I'm just sharing the information here should anyone else have a problem configuring VPN on their router.

(references)
https://www.privateinternetaccess.com/pages/client-support/dd-wrt-openvpn-older-build (old dd-wrt config notes I based my tweaks on)

https://helpdesk.privateinternetaccess.com/hc/en-us/articles/225274288-Which-encryption-auth-settings-should-I-use-for-ports-on-your-gateways- (ports and certs for the protocol people would use on PIA)

_________________
Routers:
Netgear R8000 - DD-WRT v3.0-r43420 std (06/15/20)
Netgear R9000 - DD-WRT v3.0-r43420 std (06/15/20)


Useful links:

Builds:
ftp://ftp.dd-wrt.com/betas/2020/


dd-wrt supported devices:
http://www.dd-wrt.com/wiki/index.php/Supported_Devices

So long <kong> and thanks for all the fish!
Goto page Previous  1, 2, 3 Display posts from previous:    Page 3 of 3
Post new topic   Reply to topic    DD-WRT Forum Index -> Broadcom SoC based Hardware All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum