OpenWrt Forum Archive

Topic: Update on Linksys WRT1900AC support

The content of this topic has been archived between 16 Sep 2014 and 7 May 2018. Unfortunately there are posts – most likely complete pages – missing.

gaga wrote:
JW0914 wrote:
gaga wrote:

In my Android openvpn.ovpn file I had to remove

<tls-auth>
-----BEGIN OpenVPN Static key V1-----
 
-----END OpenVPN Static key V1-----
</tls-auth>

and replace it with

tls-auth ta.key 1

When you pasted your ta.key in the xml layout, was there a blank line between the key and the lines BEGIN or END?  It would have either been that or you maybe missed a character when you copied it over.  (I hope that doesn't come across as arrogant, as it's not my intent). 

  • The reason why it would have had to be either/or is OpenVPN for Android applies the ovpn config in xml format, not in the format it's written as in the config file. You can view the ovpn config in the way it's actually applied by selecting the edit [pencil] icon, and scrolling all the way to right, until you reach the last tab.  It applies the ca.crt, client.key, client.crt, and ta.key in xml format.

  • Because of this, the only reason the xml code within the ovpn config couldn't work would have to be user error.

In reference to the key direction (i.e. the 1 after ta.key), when configuring with the ta.key in xml format, the value key-direction 1 is what specifies the 1.  If that isn't included when you configure an ovpn with the ta.key in xml format, it'll fail.  (The server and client configs are literally the exact same ones I use, and the only differences between the ones in the wiki and the ones I use are the subnets, port numbers, and certificate names.)

Uhm, ok, I did this probably ten times or more so far. I didn't pay too much attention to the copying process. After reading your post, I did. Now, it works, of course.

What happened? Well, there is a blank after each line including the last line. I never copied the last blank from the last line...

Feeling stupid right now.

lol glad you figured out where the issue was =]

Also, when it comes to firewalls, especially and even more so on routers, an SPI firewall with a default drop policy is the way to go.  It's a bit more hands on for the end user, as that means manually configuring things like Plug N Play, as port 1900 will be auto blocked, but a default deny policy is the #1 guarantee you have against intrusion. 

It's extremely important a default deny approach is taken with routers because they're literally the front door to your home, and once access is gained, physical access to your devices is granted.  To provide a real world example, while not typical it does demonstrate why it's necessary.... A friend of mine owns an auto customization shop and utilizes ~5 devices connected to a router running DD-WRT, and is serviced via Charter Spectrum Business.  About 2 months ago, I was creating a vlan for a guest network for his customers when I saw firewall logging wasn't enabled (it's disabled by default on DD-WRT for some reason).  So I enabled it and checked it about an hour later and there were hundreds of inbound connection attempts that were coming from China and Hong Kong.  DD-WRT doesn't include the greatest of firewall implementations so I pulled the iptables rules OpenWRT utilizes via fw3 and deployed them on the R6300. The next day I checked the logs and there were over 1000 blocked inbound connections originating in China.

Keep in mind this was a small business in a mid size town experiencing intrusion attempts at a rate one would expect to be seen against a financial institution or corporate network... it wasn't normal, with Charter stating they've never seen that kind of intrusion traffic against a small business in the region they serviced.  Granted, this isn't by any means a typical experience, but does show it's vitally important to ensure you do everything to prevent, or at the very least make it extremely difficult, for someone to gain access to your router and the devices behind it.

JW0914 wrote:

lol glad you figured out where the issue was =]

Also, when it comes to firewalls, especially and even more so on routers, an SPI firewall with a default drop policy is the way to go.  It's a bit more hands on for the end user, as that means manually configuring things like Plug N Play, as port 1900 will be auto blocked, but a default deny policy is the #1 guarantee you have against intrusion. 

It's extremely important a default deny approach is taken with routers because they're literally the front door to your home, and once access is gained, physical access to your devices is granted.  To provide a real world example, while not typical it does demonstrate why it's necessary.... A friend of mine owns an auto customization shop and utilizes ~5 devices connected to a router running DD-WRT, and is serviced via Charter Spectrum Business.  About 2 months ago, I was creating a vlan for a guest network for his customers when I saw firewall logging wasn't enabled (it's disabled by default on DD-WRT for some reason).  So I enabled it and checked it about an hour later and there were hundreds of inbound connection attempts that were coming from China and Hong Kong.  DD-WRT doesn't include the greatest of firewall implementations so I pulled the iptables rules OpenWRT utilizes via fw3 and deployed them on the R6300. The next day I checked the logs and there were over 1000 blocked inbound connections originating in China.

Keep in mind this was a small business in a mid size town experiencing intrusion attempts at a rate one would expect to be seen against a financial institution or corporate network... it wasn't normal, with Charter stating they've never seen that kind of intrusion traffic against a small business in the region they serviced.  Granted, this isn't by any means a typical experience, but does show it's vitally important to ensure you do everything to prevent, or at the very least make it extremely difficult, for someone to gain access to your router and the devices behind it.

I agree, and my first step was to replace the stock firmware  :-D

gaga wrote:
JW0914 wrote:

lol glad you figured out where the issue was =]

Also, when it comes to firewalls, especially and even more so on routers, an SPI firewall with a default drop policy is the way to go.  It's a bit more hands on for the end user, as that means manually configuring things like Plug N Play, as port 1900 will be auto blocked, but a default deny policy is the #1 guarantee you have against intrusion. 

It's extremely important a default deny approach is taken with routers because they're literally the front door to your home, and once access is gained, physical access to your devices is granted.  To provide a real world example, while not typical it does demonstrate why it's necessary.... A friend of mine owns an auto customization shop and utilizes ~5 devices connected to a router running DD-WRT, and is serviced via Charter Spectrum Business.  About 2 months ago, I was creating a vlan for a guest network for his customers when I saw firewall logging wasn't enabled (it's disabled by default on DD-WRT for some reason).  So I enabled it and checked it about an hour later and there were hundreds of inbound connection attempts that were coming from China and Hong Kong.  DD-WRT doesn't include the greatest of firewall implementations so I pulled the iptables rules OpenWRT utilizes via fw3 and deployed them on the R6300. The next day I checked the logs and there were over 1000 blocked inbound connections originating in China.

Keep in mind this was a small business in a mid size town experiencing intrusion attempts at a rate one would expect to be seen against a financial institution or corporate network... it wasn't normal, with Charter stating they've never seen that kind of intrusion traffic against a small business in the region they serviced.  Granted, this isn't by any means a typical experience, but does show it's vitally important to ensure you do everything to prevent, or at the very least make it extremely difficult, for someone to gain access to your router and the devices behind it.

I agree, and my first step was to replace the stock firmware  :-D

In case you have other routers that run custom firmware that's not OpenWRT's, you can list the OpenWRT fw3 iptables implementation via

fw3 print

OpenWRT's firewall, by default, is extremely secure, as it's default deny from installation onwards.

(Last edited by JW0914 on 15 Jul 2015, 08:38)

tusc wrote:
gufus wrote:

@kaloz

RC2

I can't reproduce the stalls and lock-ups but then again I don't have any Mac devices.

I don't do Mac <grin>

root@AC1900M:~# uptime
14:28:16 up 15 days, 15:47,  load average: 0.07, 0.05, 0.04
root@AC1900M:~#

I wish I had that problem. My wife and kids have various ipads/iphones so no chance of ditching Apple sad

I just posted another dump for issue #21. And this is on today's trunk too. Hopefully yuhhaurlin is reading them.

https://github.com/kaloz/mwlwifi/issues/21#issuecomment-121393929

Issue 20 (at least) is not restricted to just Apple devices.

I triggered it with an Android phone and Windows laptop.

(Last edited by DavidMcWRT on 15 Jul 2015, 09:19)

gufus wrote:
davidc502 wrote:
gufus wrote:

It's been a on-going issue, even in the early days, ie: McWRT

BTY

You could run McWRT and...

EDIT: /etc/config/wireless

config wifi-iface
option device 'radio0'
option network 'lan'
option mode 'ap'
option ssid 'Network_Name'
option encryption 'psk2+ccmp'
option key 'password'
option disassoc_low_ack '0' ---> add this line

reboot

Sorry, I was skimming and not reading..

This is to what your are referring > https://github.com/Chadster766/McWRT

Yes.

davidc502 wrote:

What have your experiences been with this build?

McWRT works fine, And as for wifi, I had the same speed.

The wifi driver is here https://github.com/TheDgtl/mrvl_wlan_v7drv

Try McWRT with the Mac fix.

Please do not give unguarded advice to run McWRT.

McWRT is unsupported and the base code (AA) is old and has not received - and will not receive - security patches for several "severe" rated published flaws.

YOU might be fine with that, but others need to make an informed decision - or at least be aware of the risks - before taking this path.

Of course the real solution is for Belkin to fix the latest driver.  And the best thing we can do to aid that is to KEEP reporting problems to them - and to direct new users to ALSO report the issues.

DavidMcWRT wrote:

and to direct new users to ALSO report the issues.

New WRT1900AC user chiming in. Is there a portal or email address I can use to nag Belkin about this? I'd be happy to help out in any way i can, even if it's just by nagging and putting pressure on Belkin.

DavidMcWRT wrote:
tusc wrote:
gufus wrote:

@kaloz

RC2

I can't reproduce the stalls and lock-ups but then again I don't have any Mac devices.

I don't do Mac <grin>

root@AC1900M:~# uptime
14:28:16 up 15 days, 15:47,  load average: 0.07, 0.05, 0.04
root@AC1900M:~#

I wish I had that problem. My wife and kids have various ipads/iphones so no chance of ditching Apple sad

I just posted another dump for issue #21. And this is on today's trunk too. Hopefully yuhhaurlin is reading them.

https://github.com/kaloz/mwlwifi/issues/21#issuecomment-121393929

Issue 20 (at least) is not restricted to just Apple devices.

I triggered it with an Android phone and Windows laptop.

Report it to yuhhaurlin then.

I have a co-worker that used to work for NASA at the machine level, specifically with VAX VMS. I was explaining how we are getting the CPU Stall crashes, and he said it sounds like a spin-lock, and recommends upping the spinlock time-outs. Essentially, he said, there's a process that isn't sending a interrupt back in a timely matter (Diver/kernel issue).

He also recommended putting Wifi 2.4 and 5Ghz on CPU1 and Ethernet1 and 0 on CPU0 (Affinity), and that may help to alleviate some of the problem (not all).

I'm trying to talk him into purchasing the 1900ac and get involved.. the reason being is this guy has 30+ years experience with Linux at the hardware layer, and would be a huge help sorting out issues. So, far he's not going out and buying one... lol   I'll keep chipping away at him.

**EDIT**

Further talks... He said, by the time we are getting the spin-locks, everything has already gone south, and probably isn't recoverable.

(Last edited by davidc502 on 15 Jul 2015, 14:58)

DavidMcWRT wrote:
davidc502 wrote:

McWRT works fine, And as for wifi, I had the same speed.

The wifi driver is here https://github.com/TheDgtl/mrvl_wlan_v7drv

Try McWRT with the Mac fix.

Please do not give unguarded advice to run McWRT.

McWRT is unsupported and the base code (AA) is old and has not received - and will not receive - security patches for several "severe" rated published flaws.

YOU might be fine with that, but others need to make an informed decision - or at least be aware of the risks - before taking this path.

Of course the real solution is for Belkin to fix the latest driver.  And the best thing we can do to aid that is to KEEP reporting problems to them - and to direct new users to ALSO report the issues.

That's the equivalent of telling someone to install and use Windows XP because it's extremely stable... albeit it for the lack of security patches since April 6, 2014. 

If you're going to recommend a user to use an obsolete build that lacks critical, severe patches, then you need to post a substantial writeup as to what the other user is getting themselves into... if you're not willing to do that, you have no business telling someone to use an unsupported build (it's been unsupported for at least a year).

(Last edited by JW0914 on 15 Jul 2015, 16:08)

hi guys,

I have some problem with my wrt1200ac and usb2 (this share with sata port) that does not work.
When I connect anything to it openwrt does not discover anything. Usb3 works normally.

Loaded modules are:
mod-usb-core - 3.18.18-1
kmod-usb-printer - 3.18.18-1
kmod-usb-storage - 3.18.18-1
kmod-usb-uhci - 3.18.18-1
kmod-usb2 - 3.18.18-1
kmod-usb2-pci - 3.18.18-1
kmod-usb3 - 3.18.18-1

and port is visible
T:  Bus=01 Lev=00 Prnt=00 Port=00 Cnt=00 Dev#=  1 Spd=480  MxCh= 1
B:  Alloc=  0/800 us ( 0%), #Int=  0, #Iso=  0
D:  Ver= 2.00 Cls=09(hub  ) Sub=00 Prot=01 MxPS=64 #Cfgs=  1
P:  Vendor=1d6b ProdID=0002 Rev= 3.18
S:  Manufacturer=Linux 3.18.18 xhci-hcd
S:  Product=xHCI Host Controller
S:  SerialNumber=f10f8000.usb3
C:* #Ifs= 1 Cfg#= 1 Atr=e0 MxPwr=  0mA
I:* If#= 0 Alt= 0 #EPs= 1 Cls=09(hub  ) Sub=00 Prot=00 Driver=hub
E:  Ad=81(I) Atr=03(Int.) MxPS=   4 Ivl=256ms

@silvah

You also need the kernel module(s) for the file system the USB drive is formatted in.

nitroshift

its not just usb drives. Dmesg shows nothing when connecting any devices thru usb2 port and the same devices works fine with usb3 port. Usb2 port is working fine with official firmware so its some openwrt bug.

bjorn wrote:
DavidMcWRT wrote:

and to direct new users to ALSO report the issues.

New WRT1900AC user chiming in. Is there a portal or email address I can use to nag Belkin about this? I'd be happy to help out in any way i can, even if it's just by nagging and putting pressure on Belkin.

For issues specific to the wireless driver, please report your experiences here:

https://github.com/kaloz/mwlwifi/issues

Note Issues 20 & 21, which seem to be the most annoying ones biting people right now.

If your symptoms match one of those issues please ALSO report you're having the same problem.

If it's something new or you're not sure, open a separate Issue.

Thanks for your help!

(Last edited by DavidMcWRT on 15 Jul 2015, 20:51)

gufus wrote:
DavidMcWRT wrote:
tusc wrote:

I wish I had that problem. My wife and kids have various ipads/iphones so no chance of ditching Apple sad

I just posted another dump for issue #21. And this is on today's trunk too. Hopefully yuhhaurlin is reading them.

https://github.com/kaloz/mwlwifi/issues/21#issuecomment-121393929

Issue 20 (at least) is not restricted to just Apple devices.

I triggered it with an Android phone and Windows laptop.

Report it to yuhhaurlin then.

I have, also asking (again) about a progress update for the v1, and specifically drawing out the point I can trigger issue 20 with non-Apple devices.

DavidMcWRT wrote:
gufus wrote:
DavidMcWRT wrote:

Issue 20 (at least) is not restricted to just Apple devices.

I triggered it with an Android phone and Windows laptop.

Report it to yuhhaurlin then.

I have, also asking (again) about a progress update for the v1, and specifically drawing out the point I can trigger issue 20 with non-Apple devices.

Thats all we can do.

gaga wrote:
gufus wrote:
gaga wrote:

Many thanks for any input!

Maybe ask here...
https://openvpn.net/index.php/open-source.html

I posted, but this forum needs someone to approve my post...right...

Ah.

does the wifi driver for these routers allow you to disable the slow (<11Mb) wifi modes?

Is anyone running stock firmware? If so how do I access "http://192.168.1.1/sysinfo.cgi" I have tried multiple ways and what used to work does not work on ver. FW_WRT1900AC_1.1.10.167514_prod.img The last trunk image lasted 2 days I came home to a rebooted router so it was not a complete lockup.....But also no logs to see what happened. And there was no one using it while I was at work Usually I run a vpn connection so I can see what is happening but I did not do that today.
Thanks in advance.

gufus wrote:

Thats all we can do.

I asked Linksys on social media to have their dev team kick Marvell in the shins and tell them to get with the program.

gaga wrote:
gufus wrote:
gaga wrote:

Many thanks for any input!

Maybe ask here...
https://openvpn.net/index.php/open-source.html

I posted, but this forum needs someone to approve my post...right...

It's because the OpenVPN forum has been subject to numerous spam attacks, so all new users must have their posts reviewed by a moderator prior to being approved.  Once a few posts have been made and they can see you're not there to spam, you'll be able to post normally w/o review.

northbound wrote:

Is anyone running stock firmware? If so how do I access "http://192.168.1.1/sysinfo.cgi" I have tried multiple ways and what used to work does not work on ver. FW_WRT1900AC_1.1.10.167514_prod.img The last trunk image lasted 2 days I came home to a rebooted router so it was not a complete lockup.....But also no logs to see what happened. And there was no one using it while I was at work Usually I run a vpn connection so I can see what is happening but I did not do that today.
Thanks in advance.

I'm running Linksys Firmware Version: 1.1.10.167514
I was able to open that after I adjusted it to 192.168.2.1  ( changed to work with the Uverse gateway/modem device on 192.168.1.253 )

davidc502 wrote:

What kind of information is available from http://192.168.1.1/sysinfo.cgi ?

Uptime mainly is what I wanted, to see how long before it reboots but there is more than that there. I do not have a copy of the info saved. I am back on trunk 46376....I jumped the gun I must have had a power problem I checked the dsl modem and it had the same uptime dang power company. I guess I should get a UPS.

@dividebyzer0 I got to the password dialog tried admin with my password also used admin as password but no go even tried root smile

Sorry, posts 6351 to 6350 are missing from our archive.