Jump to content

Welcome to Netduma Forum
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more. If you already have an account, login here - otherwise create an account for free today!

Ziltoid Racer

Ziltoid Racer

Member Since 09 Jun 2017
Offline Last Active 3 hours ago
-----

#185637 R1 DumaOS Briefly Delayed

Posted by Ziltoid Racer on 5 days ago

its really simple if they was doing this, they could easly update on whats going on, even they said we are trying to make sure it runs good and dont crash, yet they say the same thing over and over again, its been over 2 months and not one of them has took the balls to be honest or just say the R1 is old and underpowered,

 

there are those of us who do not agree with your assumption, saying it all the time does not make it true, from reading between the lines, i still have faith in Iain and the team.

 

you say it's real easy to update us on whats going on but look what happened last time they updated us, yes this 39 page monstrosity of a thread was born with yourself and others just lashing out because they updated you.

 

if i was Iain i would have put a block on any more updates too until it was time to release.




#178522 R1 DumaOS Briefly Delayed

Posted by Ziltoid Racer on 17 April 2018 - 06:05 AM

Thanks for the update guys, keep up the good work! lots of us appreciate you being upfront with the announcement. See you in a couple of weeks :)




#161578 Krack WiFi Vulnerability Upgrade (1.03.6i)

Posted by Ziltoid Racer on 19 October 2017 - 07:21 PM

flawless upgrade, thanks guys..




#159150 The N - Word Is Pewdiepie Racist? My Thoughts. PewDiePie Makes The Mother Of...

Posted by Ziltoid Racer on 13 September 2017 - 03:32 PM

Spot on bud. I like your style :)




#155839 VPN connection issues

Posted by Ziltoid Racer on 31 July 2017 - 03:11 PM

this is mine that works, as Fraser says change 4th line to the server you want to use.

 

 

client
dev tun
proto udp
remote us-california.privateinternetaccess.com 1198
resolv-retry infinite
nobind
persist-key
persist-tun
cipher aes-128-cbc
auth sha1
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0
auth-nocache
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>




#153190 Years of terrible connection GONE

Posted by Ziltoid Racer on 05 July 2017 - 11:54 AM

Being an ex Openreach engineer this is one of the biggest problems with new builds, the amount of times i would connect a new house up and there was noise on the line when using the internal cabling the builders have put in which is sub par. It was more a problem for the customer because we can replace cabling but there is a standard charge for doing anything after the Demarcation line (master socket) (£130) and it has to be agreed by your ISP before work could start, Openreach charge your ISP and depending on how good the ISP was depended if they passed on the charge to the customer, most Isp's will pass it on to the customer.

 

So if you are capable of running a cable yourself and connecting 3 wires it would be a lot cheaper, i used to give the customer the cable to do it themselves, most engineers are happy to provide cable if it saves them a extra job, infact i know of a few builders of new homes on my patch that get cable provided by Openreach because the builder asks for it, the cost of providing the cable is cheaper than having engineers replacing bad cable later down the line..

 

If you ever have a problem on your line this is why your ISP will ask you to take the lower face plate off your master socket and plug your equipment into the test port (see image below). If the problem is gone then you are told there will be a charge for a callout and replacement of cables or whatever it is the engineer finds is at fault, if the problem still persists when plugged into the test port then it's a network problem and down to Openreach to fix with no charge..

 

Note: This is a Master Socket

image.jpg

 

Taking the 2 screws out and pulling the plate away from the rest shows the test port

bt2.jpg

this is what is meant by the Demarcation line, the point where the Openreach network ends and your home network starts.

 

Note 2: If you do not have a master socket like above and you have a fault then the Openreach engineer will fit one and fix any fault no charge because no Demarcation line was present.




#152087 Need help setting up PIA VPN

Posted by Ziltoid Racer on 25 June 2017 - 01:08 PM

after retesting you are right, sometimes my ip is leaking with the push dns in config. i never noticed ssl was leaking my ip this way too. Fraser is right disable automatic dns and set the PIA dns ip's and my ip shows no where.

 

apologies for the mistake using push it seems slightly intermittent in results.... so use the R1 dns settings you can remove the push lines in config.




#152019 Virgin Media Super Hub 2 Flaw

Posted by Ziltoid Racer on 24 June 2017 - 02:17 PM

it's sensationalist journalism as usual, the chances of you getting hacked are very low....... most isp routers are the same, 99% of routers in homes are using default passwords. isp's cannot take all the blame customers should take their security more seriously.

 

take this part of what you pasted

 

How do I change my Virgin Media Super Hub 2 password?

your superhub 2 password is different to your wifi password yet the text to change the password under the above quote is for the wifi passwords which are unique to each router and not generic. it's the superhub admin password that is the same on all hubs that needs changing because it's generic admin/changeme, but so are sky's, which is admin/sky, talk talk state some routers they distribute dont even have a password so just put admin as username and nothing for the password but there is nothing about other isp's and what they are doing to stop the hacking of easy generic passwords.

 

i always change all passwords and i tell everyone i know to do the same.....

 

ps: i'm a virgin media customer.




#151952 Need help setting up PIA VPN

Posted by Ziltoid Racer on 23 June 2017 - 05:16 PM

Is this exclusive to PIA VPN? Or do other VPN providers experience the same issue?

 

It'd be interesting to hear the opinions of others on different providers. 

if you use the vpn providers software client then dns is set to theirs by the program you installed or there is a setting you need to tick, but if you are connecting with a manual config like with the R1 you do not get vpn dns by default you have to set it like i have above.

 

best way to findout is run the test at doileak.com and check under DNS request source in the results. if your isp ip is there you are leaking.

 

this will be the same for any vpn provider i would think, those providers that dont provide dns ip's use google or opendns dns ip's.

 

note: hide my ass uses opendns ip's

 

dns-nameservers 208.67.220.220
dns-nameservers 208.67.222.222




#151820 Need help setting up PIA VPN

Posted by Ziltoid Racer on 22 June 2017 - 05:27 PM

Being a new R1 user i have tried the above

 

 

Try the one below. I've tested it and it works for me :)

client
dev tun
proto udp
remote sg.privateinternetaccess.com 1198
resolv-retry 60
nobind
persist-key
persist-tun
cipher aes-128-cbc
auth sha1
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0

<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>

this connects but is still using your isp dns and so your ip address is leaking, you need to add

 

push "dhcp-option DNS 209.222.18.222"
push "dhcp-option DNS 209.222.18.218"

 

below

 

reneg-sec 0

 

this will then use PIA's dns and thus your isp ip is not showing.

 

also remember to disable WebRTC for the browsers you use. for Firefox type "about:config" in address bar and enter, next click "I accept the risk" then on page that opens paste "media.peerconnection.enabled" in the search when it shows in the list right click it and choose toggle and it will set to false, close the page and thats you done.




#151796 DumaOS Update - Recent Progress

Posted by Ziltoid Racer on 22 June 2017 - 01:34 PM

 

A long awaited update on DumaOS
 
We have made a lot of progress over the past few weeks. The OS is currently being beta tested by more of our UK based users and their feedback has been great. Thanks to their testing we have been able to make the OS very stable. This is a big milestone. DumaOS is such a big undertaking so getting to this point, where we know the firmware is solid, is a very good feeling.
 
Now we have stability we can shift our focus to usability. This means making things as easy as possible to use and much more 'plug and play' than the current R1 firmware. For example, we have developed an 'Auto Congestion Control' feature, which automatically applies Anti-flood and Hyper Traffic whenever you are gaming (this can be turned off by the more experienced users who prefer to manually configure things).
 
Once usability is in place we can then widen the beta to more users. So this means we will be expanding the beta pool soon through the Coal Mine. Open Beta should then follow not long afterwards. We've deliberately not given exact dates here - it'll be ready when it's ready!
 
After usability comes the fun stuff, when we can create many new features that we have in our Development Roadmap. We will continue to roll these out on a regular basis even after DumaOS is fully launched, meaning your router will just keep getting better and better.
 
Finally we just want to say thank you for all your support and patience. We realise it's frustrating when we don't send out status updates so we're going to make sure we do more to keep you guys in the loop. What we will say is be assured we are working as hard as we can to get DumaOS ready. It's a big step up for our company so we want it out there as much as you do. But only when it's ready!
 
Thank you for your understanding,
 
The Netduma Team

 

Nice to see development progress :)

 

I am new to the R1 but am happy to beta test if you need more, i'm uk based and am online everyday, gaming or doing other things.

 

Am so happy i got me one of these....