Jump to content

Welcome to Netduma Forum
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more. If you already have an account, login here - otherwise create an account for free today!



Member Since 09 Feb 2015
Offline Last Active Private

#171729 Hello fellow gamers (PS4, here)

Posted by bagsta69 on 30 January 2018 - 05:54 AM

Grand Turismo Sport yes, it's great game with free DLC. Just released another 10 cars and Monza circuit. It runs on 4K but I run mine through my legato capture so it defaults to the best that will give me which is 1080 but even that looks gorgeous. 

this is a replay of a race. 

#171718 Hello fellow gamers (PS4, here)

Posted by bagsta69 on 29 January 2018 - 09:58 PM

Welcome aboard, I got  Grand Cherokee, Love the thing, 3.0L CRD merc engine. 

Haven't played cod ww2 so cannot comment on connection issues on that game but I do know a fair few people have been having problems with it. 

Ive been playing a lot of GT Sport since it came out and loving it. 

#171556 WIFI Keeps disconnecting on laptop

Posted by bagsta69 on 27 January 2018 - 08:08 PM

try a different channel. 

#169469 Major Announcement: Netduma partner with NETGEAR to launch the Nighthawk XR50...

Posted by bagsta69 on 10 January 2018 - 10:54 PM

You don't have to be sarcastic...what I am saying is I feel that s worth the wait. the time spent getting the OS to work perfectly with the NG obviously delayed the development for the R1. I am very happy for Netduma it was a business decision, but still feel sore that the customers that made Netduma have been sidelined for this business agreement.
I am prepared to wait till April!! to see if it was worth the wait

Honestly Scooby, I don't think that it was a case of develop for the NG first. I was lucky enough to be a beta tester for Duma OS and so have some insight to how it has developed over the months. That said everybody is entitled to their own opinion, I am sure you will love the OS when it does drop and it will indeed be worth the wait. On the upside as well, development for new features will be much faster for the R1 than the NG so whilst the NG may get the OS release a couple of months earlier any future updates and features will be released for the R1 before the NG gets them. (in my opinion)

#169465 Major Announcement: Netduma partner with NETGEAR to launch the Nighthawk XR50...

Posted by bagsta69 on 10 January 2018 - 10:18 PM

We have inferior hardware then?. Don't get me wrong I love my R1 but you can't tell me that the software for the new OS that has been in development for the R1 for so long, worked like a dream when it was installed in the Netgear.

Im not trying to tell you that as I know that it didn't. The Mikrotik hardware is inferior to the NG modem. Nobody is trying to tell you otherwise. I really don't get what you want to hear. Iain has explained why there is a delay. I could make something up if you like!!! 

#169461 Major Announcement: Netduma partner with NETGEAR to launch the Nighthawk XR50...

Posted by bagsta69 on 10 January 2018 - 09:56 PM

So for the last 18 months they were building it for the Netgear..is that what your saying.

No, if you read what Iain says it explains it, here ill quote that bit again, 

 R1 is delayed due to hardware challenges we're solving at the moment namely automatic turbo mode(fastpath) which is required by DumaOS (user doesn't have to fiddle with UI to get max speeds) and finally how configurations are partitioned (hopefully making DumaOS unbrickable)."


#169459 Major Announcement: Netduma partner with NETGEAR to launch the Nighthawk XR50...

Posted by bagsta69 on 10 January 2018 - 09:48 PM

Just 1 question to the powers that be...if the new OS is available on the new Netgear router why can't the existing Duma family who bought before the R1 before the agreement get the new software. I understand that Netgear want to maximise their sales, but I see know reason why we can't download the updated software now .

Because it isn't ready for the original R1 Mikrotik hardware. 


To quote Netduma Iain "DumaOS is not delayed on the R1 by NG. They have no such control over what we do with our own hardware and when we do it. We are partners with NG, we do not work for them, cannot state that more clearly. R1 is delayed due to hardware challenges we're solving at the moment namely automatic turbo mode(fastpath) which is required by DumaOS (user doesn't have to fiddle with UI to get max speeds) and finally how configurations are partitioned (hopefully making DumaOS unbrickable)."

#168394 Quick question for thinkbroadband users

Posted by bagsta69 on 02 January 2018 - 06:13 AM

Okay l'm done, my screenshot keeps appearing then disappearing, and I can't delete my duplicate posts :(

There you go, now you just look mmmmmm mad sir. 

#164983 How Well Does The Geofilter Actually Work? (2 part question)

Posted by bagsta69 on 25 November 2017 - 05:16 PM

PB is spot on 

I don't play WW2 but I have read that the game tries to force local connections in some way. No idea how true it is.

#164111 Powerline Adapter Issue with auto settings (New Issue)

Posted by bagsta69 on 16 November 2017 - 04:37 PM

I have a 10 metre ethernet cable going up through the floor into mission control and into a hub off which I run 2 computers my PS4 and Smart TV and MacBook, no problems :)

#164034 seriously what is going on?

Posted by bagsta69 on 15 November 2017 - 07:59 PM

As Zennon says, Turn off console and select region then boot up console. I tried this with the US (I am in the UK) and could not connect till I tried it this way and then connected no issue. 

However with what appears to be a somewhat screwed up launch the dedicated servers may well be locked to a certain area as has already been mentioned. 

#161693 GT Sport server mislocated

Posted by bagsta69 on 20 October 2017 - 09:42 PM

showing as East coast USA 5102KM away with 25 ms ping.



#161591 GT Sport server mislocated

Posted by bagsta69 on 19 October 2017 - 10:35 PM

been playing GT Sport with 25 ms of ping to a server that says its around new york!!! im in sheffield uk.

#161355 KRACK WiFi Vulnerability

Posted by bagsta69 on 17 October 2017 - 08:44 AM

A little further reading,


As scary as this attack sounds, there are several mitigating factors at work here. First off, this is not an attack that can be pulled off remotely: An attacker would have to be within range of the wireless signal between your device and a nearby wireless access point.

More importantly, most sensitive communications that might be intercepted these days, such as interactions with your financial institution or browsing email, are likely already protected end-to-end with Secure Sockets Layer (SSL) encryption that is separate from any encryption added by WPA2 — i.e., any connection in your browser that starts with “https://”.

Also, the public announcement about this security weakness was held for weeks in order to give Wi-Fi hardware vendors a chance to produce security updates. The Computer Emergency Readiness Team has a running list of hardware vendors that are known to be affected by this, as well as links to available advisories and patches.

“There is no evidence that the vulnerability has been exploited maliciously, and Wi-Fi Alliance has taken immediate steps to ensure users can continue to count on Wi-Fi to deliver strong security protections,” reads a statement published today by a Wi-Fi industry trade group. “This issue can be resolved through straightforward software updates, and the Wi-Fi industry, including major platform providers, has already started deploying patches to Wi-Fi users. Users can expect all their Wi-Fi devices, whether patched or unpatched, to continue working well together.”

Sounds great, but in practice a great many products on the CERT list are currently designated “unknown” as to whether they are vulnerable to this flaw. I would expect this list to be updated in the coming days and weeks as more information comes in.

Some readers have asked if MAC address filtering will protect against this attack. Every network-capable device has a hard-coded, unique “media access control” or MAC address, and most Wi-Fi routers have a feature that lets you only allow access to your network for specified MAC addresses.

However, because this attack compromises the WPA2 protocol that both your wireless devices and wireless access point use, MAC filtering is not a particularly effective deterrent against this attack. Also, MAC addresses can be spoofed fairly easily.

To my mind, those most at risk from this vulnerability are organizations that have not done a good job separating their wireless networks from their enterprise, wired networks.

I don’t see this becoming a major threat to most users unless and until we start seeing the availability of easy-to-use attack tools to exploit this flaw. Those tools may emerge sooner rather than later, so if you’re super concerned about this attack and updates are not yet available for your devices, perhaps the best approach in the short run is to connect any devices on your network to the router via an ethernet cable (assuming your device still has an ethernet port).

From reading the advisory on this flaw, it appears that the most recent versions of Windows and Apple’s iOS are either not vulnerable to this flaw or are only exposed in very specific circumstances. Android devices, on the other hand, are likely going to need some patching, and soon.

#161354 KRACK WiFi Vulnerability

Posted by bagsta69 on 17 October 2017 - 08:17 AM


Not all routers are affected, 

From Mikrotik


On October 16. CERT/CC/ICASI released a public announcement about discovered vulnerabilities in WPA2 handshake protocols that affect most WiFi users and all vendors world wide. 
RouterOS v6.39.3, v6.40.4, v6.41rc are not affected!
It is important to note that the vulnerability is discovered in the protocol itself, so even a correct implementation is affected. 
These organizations did contact us earlier, so we have already released fixed versions that address the outlined issues. Not all of the discovered vulnerabilities directly impact RouterOS users, or even apply to RouterOS, but we did follow all recommendations and improved the key exchange process according to the guidelines we received from the organizations who discovered the issue. 
We released fixed versions last week, so if you upgrade your devices routinely, no further action is required.

The following applies to RouterOS software prior to updates related to the issue.

nv2 is not affected in any way. This applies to both - nv2 AP and client. There is no nonce reset in key exchange possible and key re-installation is not possible, because nv2 key exchange does not directly follow 802.11 key exchange specification.

802.11 nonce reuse
RouterOS is not affected in any way, RouterOS generates cryptographically strong random initial nonce on boot and never reuses the same nonce during uptime.

802.11 key reinstallation
The device operating as client in key exchange is affected by this issue. This means that RouterOS in station modes and APs that establish WDS links with other APs are affected. RouterOS APs (both - standalone and CAPsMAN controlled), that do not establish WDS links with other APs, are not affected. Key reinstallation by resending key exchange frame allows attacker to reset encrypted frame packet counter. This allows attacker to replay frames that where previously sent by AP to client. Please note that RouterOS DOES NOT reset key to some known value that would allow attacker to inject/decrypt any frames to/from client.

Suggested course of action
It is always recommended to upgrade to latest RouterOS version, but depending on wireless protocol and mode the suggested course of action is as follows:
- nv2: no action necessary
- 802.11/nstreme AP without WDS: no action necessary
- CAPsMAN: no action necessary
- 802.11/nstreme client (all station modes) or AP with WDS: upgrade to fixed version ASAP.
The duma operating system may or may not be vulnerable but I am sure that we will find out as soon as the Devs know. 
The security risk is probably more of a worry for big companies than individuals with a home network from the further reading I have done but sure all security is an issue but I don't think many home users need to go into melt down over it just yet. 
​First off any attack would need to be local, as in within your wifi range and if you're that worried about a local attack from a neighbour or you have such important information to hide then you're security should already circumvent any issues.