Your reports for Broadcom units are greatly appreciated !
Router:
Firmware:
Kernel:
Status:
Reset:
Errors:
This build thread is for reporting successes and problem with loading this experimental test build. This is important info for developers and users. Always state your hardware and SPECIFIC build (e.g. 34800_NEWD-2_K2.6_mega-nv64k.bin). Do not ask questions about your specific router or how to configure it in this thread; create your own thread to discuss any specific problems you have or need resolved. Please also do not respond to such questions. This thread is to report info, not to seek it. Posts that do not add to understanding this build will be deleted. Make sure you know how to flash properly and the risk before using this build. It is important to adhere to these requirements, to keep this thread from becoming impossibly long and useless. If you don't know what build to flash and how to flash properly and have a means of recovery if things should go wrong, do NOT flash this experimental test build. _________________ Unofficial Kong's release repository : http://ddwrt-kong.clonevince.fr/
Netgear R8000
Firmware Version DD-WRT v3.0-r34900M kongac (02/11/18)
Kernel Version Linux 4.4.115 #520 SMP Sun Feb 11 21:44:13 CET 2018 armv7l
Status: Wifi error count much higher than 38400, Additional DNSMasq Options not working
Reset: No, updated from --flash-latest
Received (RX) 100% 110128 OK, 3 errors
Transmitted (TX) 100% 155383 OK, 171 errors
Upgraded from 38400. Wifi error count on transmitted is much higher, see prior posts for exact numbers.
Port forwarding works fine.
Initial logging into web console was slower than usual.
Could be computer or router. Not sure yet.
Upload/download speeds are working properly on wifi and hard wired. _________________ Netgear R8000 (Kong firmware)
31 Wireless Devices
9 hardwired devices
13 ports forwarded
DDNS enabled
No QOS
Last edited by imalilteapot on Mon Feb 12, 2018 2:24; edited 1 time in total
Router: Asus RT-AC56U
Firmware: DD-WRT v3.0-r34900M kongac (02/11/18)
Kernel: Linux 4.4.115 #520 SMP Sun Feb 11 21:44:13 CET 2018 armv7l
Status: OK
Reset: NO
Errors: NONE
Starting Nmap 7.60 ( https://nmap.org ) at 2018-02-12 02:48 CET
Nmap scan report for 192.168.180.10
Host is up (0.0020s latency).
Not shown: 994 closed ports
PORT STATE SERVICE
22/tcp open ssh
23/tcp open telnet
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
443/tcp open https
MAC Address: F0:79:59:XX:XX:XX (Asustek Computer)
Nmap done: 1 IP address (1 host up) scanned in 0.32 seconds
grep -i fire /tmp/var/log/messages
Jan 1 00:00:16 host kern.notice kernel: Bridge firewalling registered
grep -i tabl /tmp/var/log/messages
Jan 1 00:00:16 host kern.info kernel: PID hash table entries: 512 (order: -1, 2048 bytes)
Jan 1 00:00:16 host kern.info kernel: Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
Jan 1 00:00:16 host kern.info kernel: Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
Jan 1 00:00:16 host kern.info kernel: Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:16 host kern.info kernel: Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:16 host kern.info kernel: futex hash table entries: 512 (order: 3, 32768 bytes)
Jan 1 00:00:16 host kern.info kernel: TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:16 host kern.info kernel: TCP bind hash table entries: 1024 (order: 1, 8192 bytes)
Jan 1 00:00:16 host kern.info kernel: TCP: Hash tables configured (established 1024 bind 1024)
Jan 1 00:00:16 host kern.info kernel: UDP hash table entries: 256 (order: 1, 8192 bytes)
Jan 1 00:00:16 host kern.info kernel: UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
Jan 1 00:00:16 host kern.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:16 host kern.info kernel: bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Jan 1 00:00:17 host kern.info kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
Feb 12 01:41:23 host kern.info kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
startservice firewall
cat: can't open '/proc/sys/net/netfilter/nf_conntrack_flush': No such file or directory
cannot open /proc/net/arp_spoofing_enable
start firewall6
ip6tables v1.3.7: Couldn't find match `rt'
Try `ip6tables -h' or 'ip6tables --help' for more information.
ip6tables v1.3.7: Couldn't find match `rt'
Try `ip6tables -h' or 'ip6tables --help' for more information.
ip6tables v1.3.7: Couldn't find match `rt'
Try `ip6tables -h' or 'ip6tables --help' for more information. _________________ 2 times APU2 Opnsense 21.1 with Sensei
2 times RT-AC56U running DD-WRT 45493 (one as Gateway, the other as AP, both bridged with LAN cable)
3 times Asus RT-N16 shelved
E4200 V1 running freshtomato 2020.8 (bridged with LAN cable)
3 times Linksys WRT610N V2 converted to E3000 and 1 original E3000 running freshtomato 2020.8 (bridged with LAN cable)
I'd love to test what you've done with NMAP but I need more info.
Are going going from WAN > LAN or LAN > LAN?
What is the device you are scanning thats at 180.10? The router? Or another machine? _________________ Netgear R8000 (Kong firmware)
31 Wireless Devices
9 hardwired devices
13 ports forwarded
DDNS enabled
No QOS
Starting Nmap 7.60 ( https://nmap.org ) at 2018-02-12 02:48 CET
Nmap scan report for 192.168.180.10
Host is up (0.0020s latency).
Not shown: 994 closed ports
PORT STATE SERVICE
22/tcp open ssh
23/tcp open telnet
53/tcp open domain
80/tcp open http
88/tcp open kerberos-sec
443/tcp open https
MAC Address: F0:79:59:XX:XX:XX (Asustek Computer)
Nmap done: 1 IP address (1 host up) scanned in 0.32 seconds
grep -i fire /tmp/var/log/messages
Jan 1 00:00:16 host kern.notice kernel: Bridge firewalling registered
grep -i tabl /tmp/var/log/messages
Jan 1 00:00:16 host kern.info kernel: PID hash table entries: 512 (order: -1, 2048 bytes)
Jan 1 00:00:16 host kern.info kernel: Dentry cache hash table entries: 16384 (order: 4, 65536 bytes)
Jan 1 00:00:16 host kern.info kernel: Inode-cache hash table entries: 8192 (order: 3, 32768 bytes)
Jan 1 00:00:16 host kern.info kernel: Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:16 host kern.info kernel: Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:16 host kern.info kernel: futex hash table entries: 512 (order: 3, 32768 bytes)
Jan 1 00:00:16 host kern.info kernel: TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Jan 1 00:00:16 host kern.info kernel: TCP bind hash table entries: 1024 (order: 1, 8192 bytes)
Jan 1 00:00:16 host kern.info kernel: TCP: Hash tables configured (established 1024 bind 1024)
Jan 1 00:00:16 host kern.info kernel: UDP hash table entries: 256 (order: 1, 8192 bytes)
Jan 1 00:00:16 host kern.info kernel: UDP-Lite hash table entries: 256 (order: 1, 8192 bytes)
Jan 1 00:00:16 host kern.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
Jan 1 00:00:16 host kern.info kernel: bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Jan 1 00:00:17 host kern.info kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team
Feb 12 01:41:23 host kern.info kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.
startservice firewall
cat: can't open '/proc/sys/net/netfilter/nf_conntrack_flush': No such file or directory
cannot open /proc/net/arp_spoofing_enable
start firewall6
ip6tables v1.3.7: Couldn't find match `rt'
Try `ip6tables -h' or 'ip6tables --help' for more information.
ip6tables v1.3.7: Couldn't find match `rt'
Try `ip6tables -h' or 'ip6tables --help' for more information.
ip6tables v1.3.7: Couldn't find match `rt'
Try `ip6tables -h' or 'ip6tables --help' for more information.
There is no ip6tables match rule in our firewall code, I assume you have placed some broken rule in custom firewall rule or startup script.
When the router reboots, I always watch my 7 wireless (2.4) security cameras come online in Blue Iris. With 34900, all 7 popped up fast and nearly simultaneously. First time that has happened. With all previous versions, the cameras would come online one at a time and take up to 30 seconds for the last one to fill in.
Maybe that's a fluke... or something with WiFi is better in this version?
Posted: Mon Feb 12, 2018 12:40 Post subject: RT-AC3200
Hello
Asus RT-AC3200
Firmware Version DD-WRT v3.0-r34900M kongac (02/11/1
Kernel Version Linux 4.4.115 #520 SMP Sun Feb 11 21:44:13 CET 2018 armv7l
Status: working
Reset: No,
Received (RX) 100% 16867 OK, 2 errors
Transmitted (TX) 100% 13307 OK, no error _________________ RT-AC68U
RT-AC3200
TL-MR3020
TL-WDR3600 v1
Also without telling us, if you scanned from wan to wan ip, the result doesn't tell us anything.
No, I did not scan from WAN to WAN, I scanned from a Kali box to the router, which has to be firewalled. It did not happen before build 34886.
Modem/router: Public IPv4 IP.
Kali box: 192.168.180.11
RT-AC56U: 192.168.180.10 (WAN IP, its own subnet is 192.168.2.0/24).
Anyway, I get the same messages from startservice firewall from build 34800M, which has a working firewall, though. _________________ 2 times APU2 Opnsense 21.1 with Sensei
2 times RT-AC56U running DD-WRT 45493 (one as Gateway, the other as AP, both bridged with LAN cable)
3 times Asus RT-N16 shelved
E4200 V1 running freshtomato 2020.8 (bridged with LAN cable)
3 times Linksys WRT610N V2 converted to E3000 and 1 original E3000 running freshtomato 2020.8 (bridged with LAN cable)
Update: emptied my firewall script, disabled YAMon3 and rebooted the router.
# startservice firewall
cat: can't open '/proc/sys/net/netfilter/nf_conntrack_flush': No such file or directory
cannot open /proc/net/arp_spoofing_enable
start firewall6
Firewall is still dead. Oh, no, after startservice firewall, it isn't. _________________ 2 times APU2 Opnsense 21.1 with Sensei
2 times RT-AC56U running DD-WRT 45493 (one as Gateway, the other as AP, both bridged with LAN cable)
3 times Asus RT-N16 shelved
E4200 V1 running freshtomato 2020.8 (bridged with LAN cable)
3 times Linksys WRT610N V2 converted to E3000 and 1 original E3000 running freshtomato 2020.8 (bridged with LAN cable)
Ok, I have re-enabled my firewall script and YAMon3. After issuing manually startservice firewall, the firewall works ok. But it does not do that automatically, regardless of whether my firewall scripts and/or YAMon3 are enabled.
Router NameR6400-AP
Router ModelNetgear R6400
Firmware Version DD-WRT v3.0-r34900M kongac (02/11/1
Kernel VersionLinux 4.4.115 #520 SMP Sun Feb 11 21:44:13 CET 2018 armv7l
I'm using the R6400 in simple AP mode. Ethernet connected to WAN port, all bridged.
time.nist.gov NTP not working:
Dec 31 19:00:15 R6400-AP daemon.err ntpclient[978]: Failed connecting to time.nist.gov [2610:20:6f15:15::27]: Address family not supported by protocol
Dec 31 19:00:15 R6400-AP daemon.err process_monitor[977]: cyclic NTP Update failed (servers time.nist.gov)
Also, could not get my devices to connect with previous Wireless settings. Changed Authentication Type (Under Advanced Wireless Settings) from "Shared Key" to "Auto" and all works as it should on my WPA2-AES Secured WiFi.
Otherwise, seems to work just fine. Will watch for several days for consistency and stability...
Posted: Mon Feb 12, 2018 20:21 Post subject: Busybox
Those busybox updates are really a pain.
First, that cp problem, then we loose multipath (nexthop) in iproute, now ping started to act funny, sometimes work and sometimes don't.
I have a script to ping a host every minute, the ping command simply decided to stay there and don't timeout or exit.
Full version of iproute and ping don't do that,
This is a router, at least the network part, should be full featured.
If we have to install the full version of every command to work as it should, what we gain in using busybox anyway?
edit: solved the ping problem with coreutils-timeout
Last edited by diogosena on Tue Feb 13, 2018 0:22; edited 1 time in total