Jump to content

ggkthx

Members
  • Content count

    59
  • Joined

  • Last visited

About ggkthx

  • Rank
    Member

Profile Information

  • Gender
    Not Telling
  1. ggkthx

    Wifi Calling

    Also doesn't work. Can other members on the XR500 confirm if they have WiFi Calling working?
  2. ggkthx

    Wifi Calling

    Doesn't work after disabling each setting individually and rebooting.
  3. Is it just me or is wifi calling not working on the XR500 and is there some setting I need to change? I was previously on the R1 and changing to preemptive mode allowed it. Any help or suggestions appreciated.
  4. I am actually experiencing the same issue. Wired connections continue to work while the wifi goes down. A factory reset/reboot usually solves it temporarily. Disable the wifi on the R1 and try using a spare router as an AP while they sort it out in the the new firmware.
  5. I guess the fix is to enable Wifi Workaround. Ever since I did, I have had lesser intermittent disconnections via Wifi. If it helps, I have 12 devices connected to the R1 at any one time.
  6. Ahh...Would it be updated in DumaOS?
  7. They were the same addresses actually. Noticed the R1 GUI slows down heavily especially after making multiple changes to the VPN config. In any case, I have rebooted the router and used the provided by Ziltoid and all seems good so far. I mean, it's fine if I don't see my ISP's DNS in the test results right? Edit: I take that back. The issue still happens occasionally throughout the last 24 hours. I did read somewhere that block-outside-dns option is only for Windows devices though.
  8. Think I'll stick to manually inputting the DNS servers in the LAN section.
  9. Tried it, now all the DNS test sites report that I'm using either Google's or OpenDNS's servers... Rebooted the R1 and made sure ipv6 was disabled but still same results. Tested on Mac and iOS devices. Not sure if it makes a difference.
  10. Can also confirm this doesn't work on NordVPN's app. I think it's due to the IKEv2 protocol that these 2 providers implemented in their app.
  11. Roger that! And thanks for the find Ziltoid!
  12. I think you meant PIA VPN servers? I still get DNS leaks. :/
  13. client dev tun proto udp remote sg.privateinternetaccess.com 1198 resolv-retry 60 nobind persist-key persist-tun cipher aes-128-cbc auth sha1 tls-client remote-cert-tls server auth-user-pass comp-lzo verb 1 reneg-sec 0 push "dhcp-option DNS 209.222.18.222" push "dhcp-option DNS 209.222.18.218" <ca> -----BEGIN CERTIFICATE----- MIIFqzCCBJOgAwIBAgIJAKZ7D5Yv87qDMA0GCSqGSIb3DQEBDQUAMIHoMQswCQYD VQQGEwJVUzELMAkGA1UECBMCQ0ExEzARBgNVBAcTCkxvc0FuZ2VsZXMxIDAeBgNV BAoTF1ByaXZhdGUgSW50ZXJuZXQgQWNjZXNzMSAwHgYDVQQLExdQcml2YXRlIElu dGVybmV0IEFjY2VzczEgMB4GA1UEAxMXUHJpdmF0ZSBJbnRlcm5ldCBBY2Nlc3Mx IDAeBgNVBCkTF1ByaXZhdGUgSW50ZXJuZXQgQWNjZXNzMS8wLQYJKoZIhvcNAQkB FiBzZWN1cmVAcHJpdmF0ZWludGVybmV0YWNjZXNzLmNvbTAeFw0xNDA0MTcxNzM1 MThaFw0zNDA0MTIxNzM1MThaMIHoMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0Ex EzARBgNVBAcTCkxvc0FuZ2VsZXMxIDAeBgNVBAoTF1ByaXZhdGUgSW50ZXJuZXQg QWNjZXNzMSAwHgYDVQQLExdQcml2YXRlIEludGVybmV0IEFjY2VzczEgMB4GA1UE AxMXUHJpdmF0ZSBJbnRlcm5ldCBBY2Nlc3MxIDAeBgNVBCkTF1ByaXZhdGUgSW50 ZXJuZXQgQWNjZXNzMS8wLQYJKoZIhvcNAQkBFiBzZWN1cmVAcHJpdmF0ZWludGVy bmV0YWNjZXNzLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPXD L1L9tX6DGf36liA7UBTy5I869z0UVo3lImfOs/GSiFKPtInlesP65577nd7UNzzX lH/P/CnFPdBWlLp5ze3HRBCc/Avgr5CdMRkEsySL5GHBZsx6w2cayQ2EcRhVTwWp cdldeNO+pPr9rIgPrtXqT4SWViTQRBeGM8CDxAyTopTsobjSiYZCF9Ta1gunl0G/ 8Vfp+SXfYCC+ZzWvP+L1pFhPRqzQQ8k+wMZIovObK1s+nlwPaLyayzw9a8sUnvWB /5rGPdIYnQWPgoNlLN9HpSmsAcw2z8DXI9pIxbr74cb3/HSfuYGOLkRqrOk6h4RC OfuWoTrZup1uEOn+fw8CAwEAAaOCAVQwggFQMB0GA1UdDgQWBBQv63nQ/pJAt5tL y8VJcbHe22ZOsjCCAR8GA1UdIwSCARYwggESgBQv63nQ/pJAt5tLy8VJcbHe22ZO sqGB7qSB6zCB6DELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRMwEQYDVQQHEwpM b3NBbmdlbGVzMSAwHgYDVQQKExdQcml2YXRlIEludGVybmV0IEFjY2VzczEgMB4G A1UECxMXUHJpdmF0ZSBJbnRlcm5ldCBBY2Nlc3MxIDAeBgNVBAMTF1ByaXZhdGUg SW50ZXJuZXQgQWNjZXNzMSAwHgYDVQQpExdQcml2YXRlIEludGVybmV0IEFjY2Vz czEvMC0GCSqGSIb3DQEJARYgc2VjdXJlQHByaXZhdGVpbnRlcm5ldGFjY2Vzcy5j b22CCQCmew+WL/O6gzAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBDQUAA4IBAQAn a5PgrtxfwTumD4+3/SYvwoD66cB8IcK//h1mCzAduU8KgUXocLx7QgJWo9lnZ8xU ryXvWab2usg4fqk7FPi00bED4f4qVQFVfGfPZIH9QQ7/48bPM9RyfzImZWUCenK3 7pdw4Bvgoys2rHLHbGen7f28knT2j/cbMxd78tQc20TIObGjo8+ISTRclSTRBtyC GohseKYpTS9himFERpUgNtefvYHbn70mIOzfOJFTVqfrptf9jXa9N8Mpy3ayfodz 1wiqdteqFXkTYoSDctgKMiZ6GdocK9nMroQipIQtpnwd4yBDWIyC6Bvlkrq5TQUt YDQ8z9v+DMO6iwyIDRiU -----END CERTIFICATE----- </ca>
  14. So I edited my OpenVPN config for iOS and R1 and tried with and without those 2 additional lines. Seems like there isn't any DNS leak for my iDevices except for the R1 even after inputting those 2 lines. Weird. I also manually inputted the DNS server IPs in the LAN section for good measure but doileak.com still detects a leak.
×