Jump to content

Killhippie

DumaOS Insiders
  • Content Count

    1,476
  • Joined

  • Days Won

    26

Reputation Activity

  1. Like
    Killhippie got a reaction from BaloMatias in XR300 Firmware update   
    Latest version is now 1.0.3.50 as seen here for a security vulnerability. This should be added to the latest firmwares please.

    https://kb.netgear.com/000062185/XR300-Firmware-Version-1-0-3-50
  2. Like
    Killhippie got a reaction from Netduma Fraser in Dynamic QoS and Network Monitor Upgrades   
    Since this thread is going nowhere fast maybe its time to lock it @Netduma Fraser
  3. Like
    Killhippie got a reaction from Newfie in Dynamic QoS and Network Monitor Upgrades   
    Since this thread is going nowhere fast maybe its time to lock it @Netduma Fraser
  4. Like
    Killhippie reacted to e38BimmerFN in DumaOS 3.0 open beta for XR 500/450   
    I would lock this thread Fraser.¬†ūüėČ
  5. Like
    Killhippie reacted to Zippy in DumaOS 3.0 open beta for XR 500/450   
    For those of you that download and upgrade to the beta 3.0  id make sure you also have a copy of the .56 firmware so if something goes wrong you can go back to the most stable firmware non 3.0 of course which is .56.. That is just some friendly advice.. Ive been getting an ear full from a couple of my friends on the beta..  Betas are going to have issues..That is why its a beta.. So be pre paired! And report your issues on Netgear forum with proper info.. If you dont how can they even fix things..
    If you dont have the time to report issues with the beta then dont download it.. Again this is just friendly advice so some dont get frustrated..
    Thanks!
    Zippy.
  6. Like
    Killhippie got a reaction from Netduma Fraser in Issues XR500   
    I have done many Beta tests for Netgear, when you agreed to use the beta firmware it does mention the fact that the firmware may not be stable and may cause unexpected behaviour, hence it being a beta. If issues like this happen TFTP its the only way to get your router back from the dead. Beta testing is not always fun, but it is needed. If this is not really what you expected after getting your router functional stick to the latest release version until 3.0 is released.
  7. Like
    Killhippie got a reaction from Kostas83 in DumaOS 3.0 open beta for XR 500/450   
    Since its a Netgear beta how will the issues be reported back? Thats a lot of work for the Netduma guys passing back every comment also there is the issue with Netgears firmware being on it too which also needs testing. Its a Netgear beta with DumaOS and should be done really on the Netgear forum so Netgear can see what's going on first-hand really
  8. Like
    Killhippie got a reaction from Newfie in DumaOS 3.0 open beta for XR 500/450   
    Since its a Netgear beta how will the issues be reported back? Thats a lot of work for the Netduma guys passing back every comment also there is the issue with Netgears firmware being on it too which also needs testing. Its a Netgear beta with DumaOS and should be done really on the Netgear forum so Netgear can see what's going on first-hand really
  9. Like
    Killhippie reacted to BIG__DOG in XR1000 DumaOS 3.0 AX router is coming.   
    eye candy. They make em to resemble stealth fighters to give the impression of speed and responsiveness. It's all about marketing and capturing a certain age group and target audience.
  10. Like
    Killhippie reacted to this ol hack in Issues XR500   
    Agreed! All these people wanting access to the beta, then complain when there's an issue. If you're not willing to deal with issues then you should never install any beta software or firmware. 
  11. Like
    Killhippie got a reaction from Newfie in Issues XR500   
    I have done many Beta tests for Netgear, when you agreed to use the beta firmware it does mention the fact that the firmware may not be stable and may cause unexpected behaviour, hence it being a beta. If issues like this happen TFTP its the only way to get your router back from the dead. Beta testing is not always fun, but it is needed. If this is not really what you expected after getting your router functional stick to the latest release version until 3.0 is released.
  12. Like
    Killhippie got a reaction from Newfie in XR1000 DumaOS 3.0 AX router is coming.   
    The RT-AX86U looks much better, less like back end of a spaceship.
  13. Like
    Killhippie got a reaction from BIG__DOG in XR1000 DumaOS 3.0 AX router is coming.   
    The RT-AX86U looks much better, less like back end of a spaceship.
  14. Like
    Killhippie reacted to BIG__DOG in XR1000 DumaOS 3.0 AX router is coming.   
    Asus have 1 that looks looks similar. Bloody ugly looking things. Under the hood the XR1000 is a tempting purchase.

  15. Like
    Killhippie reacted to Newfie in XR1000 DumaOS 3.0 AX router is coming.   
    Just noticed the page has gone with the link Killhippie posted. Looks like it’s been pulled for some reason.
  16. Like
    Killhippie reacted to Netduma Fraser in DND-Rebind Attacks - Question   
    I believe it does but will double check with the team.
  17. Like
    Killhippie reacted to GenMatrix in DND-Rebind Attacks - Question   
    Thanks again @Killhippie.
    As a side note, this is a great opportunity to use DumaOS Adblock. Didn't use it before since I had my Pi-Hole going but considering the circumstances, it's time to give it a go. =D
  18. Like
    Killhippie got a reaction from GenMatrix in DND-Rebind Attacks - Question   
    Tbh Netgear have the most false positives in their routers and I have never seen DNS Rebind as a false positive alas. It could be a hidden setting within the R2 firmware causing the issue which is DNS rebind protection but turning that off if it exists is a bit like opening a hornets nest. KInd of damned if you do and damned if you dont. Just be very wary.
  19. Like
    Killhippie got a reaction from GenMatrix in DND-Rebind Attacks - Question   
    These are not good,  DNS rebinding is a method of manipulating resolution of domain names that is commonly used as a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script" so I would try without the Pi-Hole and run a scan on your system. See the link on lifehacker for some advice. Avoid malicious web pages too and up your security on the pi-hole and router. basically a script you have visited on a malicious webpage somewhere could get control of your whole LAN its time for a major scan and reboot of your router and doing whatever you need to do with PI-Hole to protect yourself like turning off UPnP and using strong passwords etc.

     Also its best to not to run your own DNS servers. generally for most users, your ISP probably provides DNS servers that are protected by DNSSEC. For users that need improved performance, there are paid DNS hosting providers that do a great job without the risks.

    https://en.wikipedia.org/wiki/DNS_rebinding

    https://lifehacker.com/prevent-dns-rebinding-attacks-by-adjusting-your-router-1827022291
  20. Thanks
    Killhippie got a reaction from Zippy in DND-Rebind Attacks - Question   
    Bug testing but under a NDA so cant really talk about it, Zippy.
  21. Like
    Killhippie got a reaction from Netduma Fraser in Ping Test (Under Load) - Always getting C rating   
    From my understanding reading the sky forum just now Sky don't have a bridge mode on their routers and are unlikely to add it, Fraser. Its locked down pretty much as you can read here.

    https://helpforum.sky.com/t5/Broadband/Sky-router-bridge-mode-any-eta-on-this-being-possible/td-p/3265276
  22. Like
    Killhippie got a reaction from Newfie in DND-Rebind Attacks - Question   
    These are not good,  DNS rebinding is a method of manipulating resolution of domain names that is commonly used as a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script" so I would try without the Pi-Hole and run a scan on your system. See the link on lifehacker for some advice. Avoid malicious web pages too and up your security on the pi-hole and router. basically a script you have visited on a malicious webpage somewhere could get control of your whole LAN its time for a major scan and reboot of your router and doing whatever you need to do with PI-Hole to protect yourself like turning off UPnP and using strong passwords etc.

     Also its best to not to run your own DNS servers. generally for most users, your ISP probably provides DNS servers that are protected by DNSSEC. For users that need improved performance, there are paid DNS hosting providers that do a great job without the risks.

    https://en.wikipedia.org/wiki/DNS_rebinding

    https://lifehacker.com/prevent-dns-rebinding-attacks-by-adjusting-your-router-1827022291
  23. Like
    Killhippie got a reaction from Netduma Fraser in DND-Rebind Attacks - Question   
    These are not good,  DNS rebinding is a method of manipulating resolution of domain names that is commonly used as a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script" so I would try without the Pi-Hole and run a scan on your system. See the link on lifehacker for some advice. Avoid malicious web pages too and up your security on the pi-hole and router. basically a script you have visited on a malicious webpage somewhere could get control of your whole LAN its time for a major scan and reboot of your router and doing whatever you need to do with PI-Hole to protect yourself like turning off UPnP and using strong passwords etc.

     Also its best to not to run your own DNS servers. generally for most users, your ISP probably provides DNS servers that are protected by DNSSEC. For users that need improved performance, there are paid DNS hosting providers that do a great job without the risks.

    https://en.wikipedia.org/wiki/DNS_rebinding

    https://lifehacker.com/prevent-dns-rebinding-attacks-by-adjusting-your-router-1827022291
  24. Like
    Killhippie got a reaction from Zippy in DND-Rebind Attacks - Question   
    These are not good,  DNS rebinding is a method of manipulating resolution of domain names that is commonly used as a form of computer attack. In this attack, a malicious web page causes visitors to run a client-side script" so I would try without the Pi-Hole and run a scan on your system. See the link on lifehacker for some advice. Avoid malicious web pages too and up your security on the pi-hole and router. basically a script you have visited on a malicious webpage somewhere could get control of your whole LAN its time for a major scan and reboot of your router and doing whatever you need to do with PI-Hole to protect yourself like turning off UPnP and using strong passwords etc.

     Also its best to not to run your own DNS servers. generally for most users, your ISP probably provides DNS servers that are protected by DNSSEC. For users that need improved performance, there are paid DNS hosting providers that do a great job without the risks.

    https://en.wikipedia.org/wiki/DNS_rebinding

    https://lifehacker.com/prevent-dns-rebinding-attacks-by-adjusting-your-router-1827022291
  25. Like
    Killhippie got a reaction from Newfie in XR1000 DumaOS 3.0 AX router is coming.   
    I think the XR1000 will be a nice router, it still does 4800Mbps theoretical on 5Ghz. Bitdefender and DumaOS together may be interesting, when its out here I'm sure Fraser will tell us if it slows down with both on as its two lots of DPI going on at once. I have to say I like the design more as times goes on, the RAX50 which its based on is a bit more traditional. (make it two coffees)
×
×
  • Create New...