Jump to content

Killhippie

DumaOS Insiders
  • Content Count

    851
  • Joined

  • Days Won

    20

Reputation Activity

  1. Like
    Killhippie reacted to SenSei G in Having Weird Issues while using Nvidia Shield TV In-Home Gamestream and UPnP.   
    It definitely makes sense what you are saying, however I really don't wanna risk it but if it does gives us some light in order to fix this problem, I will go ahead and try it...
  2. Confused
    Killhippie reacted to Netduma Fraser in XR500 Firmware version 2.3.2.56 released.   
    Of course we plan to continue to fix issues and keep improving the firmware but no specific news on fix timelines.
  3. Like
    Killhippie got a reaction from TurboFreak in XR500 Firmware version 2.3.2.56 released.   
    Well since you can’t make Netgear move any faster or Netduma how do you plan to make that happen? Once again we can’t but, I stand but by statement on spreading FUD because riling more discontent over software that hasn’t even been released yet is pointless and we have no control over the process anyway. All this is is doing is causing people to get even more frustrated right after an update has dropped. (I agree 8 months is way to long though) but starting a potential  flame war that could go on for months on end will have really no point, its just getting old now.
     Sometimes our thoughts should be kept to ourselves and this is coming from someone who’s been pretty vocal about how frustrating I found the huge gap between milestone 1.3 and this update and the lack of bug fixes, but I can’t change the outcome I can’t change when the milestone 1.4  will come and I can’t be bothered to get that upset about something that I will never have any control over anyway I can make my feelings known but maybe in a more constructive way with some form of discourse with Devs again considering how bug fixing is going. Now if you can develop new firmware yourself faster and with less bugs feel free to make your own fork. (I wish Voxel could be involved in this)
     Yes it’s frustrating that there are bugs but at the end of the day there are always going to be issues with firmware after all there is no such thing as a perfect software. Also you’ve decided things aren’t going to be fixed at all, well that's how it comes over to me, so how about just giving the guys some breathing space and waiting for 1.4 to come out before condemning it. Now if it’s a mess then fair enough, but until we get to try it take the new fixes (what few there are) be glad you’ve got some security patches that may stop the router being compromised and see what happens next.  
    This forum is just getting way to toxic and that’s no good for anybody, and getting people fired up about something neither you or I know anything about isn’t the best way forward as I see it. Your mileage may vary though.  Also how did the update go for you, how was your XR router?  You haven’t said what bugs you have found with the new firmware and sharing them would obviously be really helpful in getting those things fixed...
  4. Like
    Killhippie got a reaction from Derlandes in No milestone 1.4 announcement?   
    Delays seem to be the one thing we can guarantee will happen it seems. I know this stuff happens but surely this was something that really didn't need any delays and should have been gotten in front of ready to be posted, otherwise it's just another case of rinse and repeat.
  5. Haha
    Killhippie got a reaction from plb in No milestone 1.4 announcement?   
    Netgeasr cant predict when Netgear is releasing a firmware update
  6. Like
    Killhippie got a reaction from SenSei G in Having Weird Issues while using Nvidia Shield TV In-Home Gamestream and UPnP.   
    Weird how these bugs work on different set ups, I'm not dropping anything out on Ethernet at all, streaming etc is flawless. This why Netgear should really do more controlled public beta testing as there are so many permutations to check out. Also it could be hardware, you could downgrade briefly and see if things work okay and then update again, but I understand you not wanting to.
  7. Like
    Killhippie got a reaction from Dilly Dilly in No milestone 1.4 announcement?   
    Delays seem to be the one thing we can guarantee will happen it seems. I know this stuff happens but surely this was something that really didn't need any delays and should have been gotten in front of ready to be posted, otherwise it's just another case of rinse and repeat.
  8. Like
    Killhippie reacted to stef in router login   
    sorted it thx guys all I had to do was refresh my sky router for it to let me log in
  9. Like
    Killhippie got a reaction from SenSei G in XR500 Firmware version 2.3.2.56 released.   
    Does it include bug fixes for DumaOS in between milestone launches? Because all the new features in the world wont help if you don't patch the bugs that exist after updates, like the bugs that never got patched in milestone 1.3 and were not patched in the last update for some unknown reason, I mean Netduma did have 8 months to fix these.

     There has to be a change of direction in patching DumaOS bugs, there are still major bugs from December 2018, which result in people having to turn off QoS like the VLAN tagging bug for instance. These bugs are still causing people issues 8 months into Milestone 1.3 and that's after that's a recent update too. No new feature set in Milestone 1.4 will fix what is pretty much a non existent patching cycle for bugs in DumaOS. I really hope you have thought and worked on this aspect of DumaOS's life cycle in tandem with Netgear, otherwise nothing has really changed no matter what you add feature wise. Maybe you need to slow down creating new feature's and  concentrate on fixing the broken ones first?
  10. Like
    Killhippie got a reaction from SenSei G in XR500 Firmware version 2.3.2.56 released.   
    The irony of a late post about new features is somewhat unfortunate. I'm interested in what's fixed, less so what's with what's new although its always nice to see what features are being implemented, maybe IPv6 to bring DumaOS inline with almost every routers made in the last 5+ years or more, well I can dream Hoping for some more automation (which can be controlled manually) in QoS and Antibufferbloat and some new groups for devices that QoS recognises and adjusts itself for to take the guesswork out of giving the right amount of bandwidth to devices rather than guessing, like the long dead Streamboost.  Also an announcement on DumaOS and Netgear updates and maybe a more timely schedule worked out between both companies for bug fixes for XR routers going forward would be great.
  11. Like
    Killhippie reacted to Netduma Alex in How to remove offline devices from router?   
    Alright i'll make sure it's on the roadmap.
  12. Like
    Killhippie reacted to BIG__DOG in router login   
    your xr300/500 should be connected to your sky box and your pc connected to your XR300/500.
  13. Like
    Killhippie reacted to sharpz44 in How to remove offline devices from router?   
    First thing I noticed, I was wondering if the SSID had been changed and the duplicates were still hanging there but thought that should not really happen.... strange amount of devices
  14. Like
    Killhippie got a reaction from Netduma Fraser in Security-Advisory-for-Remote-Kernel-Vulnerabilities on X500/700   
    NETGEAR has released firmware fixes or hotfixes for KCodes NetUSB unauthenticated remote kernel information disclosure and arbitrary memory read security vulnerabilities on the following product models:
    XR500 running firmware versions prior to v2.3.2.56
    XR700 running firmware versions prior to v1.0.1.18_BETA
    D6000 running firmware versions prior to v1.0.0.78
    D6400 running firmware versions prior to v1.0.0.88
    D7800 running firmware versions prior to v1.0.1.56
    DC112A running firmware versions prior to v1.0.0.44        
    EX6200 running firmware versions prior to v1.0.3.90         
    EX6200v2 running firmware versions prior to v1.0.1.78     
    EX8000 running firmware versions prior to v1.0.1.202       
    R6250 running firmware versions prior to v1.0.4.38_BETA
    R6400 running firmware versions prior to v1.0.1.50
    R7300DST running firmware versions prior to v1.0.0.74_BETA
    R7500v2 running firmware versions prior to v1.0.3.41_BETA
    R7800 running firmware versions prior to v1.0.2.63_BETA
    R7900 running firmware versions prior to 1.0.3.14_10.0.40_BETA
    R8000 running firmware versions prior to 1.0.4.38_10.1.59_BETA
    R8900 running firmware versions prior to v1.0.4.36_BETA
    R9000 running firmware versions prior to v1.0.4.36_BETA
    WNDR4300v2 running firmware versions prior to v1.0.0.60_BETA          
    WNDR4500v3 running firmware versions prior to v1.0.0.60_BETA

    The firmware versions that end in “_BETA” are security hotfixes. Security hotfixes are beta firmware created outside of normal development and testing processes. While the hotfixes do fix the security vulnerabilities identified above, they could negatively affect the regular operation of your device. Though our pre-deployment testing process did not indicate that these hotfixes would impact device operability, we always encourage our users to monitor their device closely after installing the firmware hotfix.
    NETGEAR strongly recommends that you download the latest firmware fixes or hotfixes for these product models as soon as possible.
    CVSS v3 Rating: High
    CVSS v3 Score: 8.8
    Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * I would suggest not running older firmware on XR routers unless its just for testing purposes and that you update to version 2.3.2.56 or 1.0.1.18_BETA to be safe
     
     
     
  15. Like
    Killhippie got a reaction from Mement in Security-Advisory-for-Remote-Kernel-Vulnerabilities on X500/700   
    NETGEAR has released firmware fixes or hotfixes for KCodes NetUSB unauthenticated remote kernel information disclosure and arbitrary memory read security vulnerabilities on the following product models:
    XR500 running firmware versions prior to v2.3.2.56
    XR700 running firmware versions prior to v1.0.1.18_BETA
    D6000 running firmware versions prior to v1.0.0.78
    D6400 running firmware versions prior to v1.0.0.88
    D7800 running firmware versions prior to v1.0.1.56
    DC112A running firmware versions prior to v1.0.0.44        
    EX6200 running firmware versions prior to v1.0.3.90         
    EX6200v2 running firmware versions prior to v1.0.1.78     
    EX8000 running firmware versions prior to v1.0.1.202       
    R6250 running firmware versions prior to v1.0.4.38_BETA
    R6400 running firmware versions prior to v1.0.1.50
    R7300DST running firmware versions prior to v1.0.0.74_BETA
    R7500v2 running firmware versions prior to v1.0.3.41_BETA
    R7800 running firmware versions prior to v1.0.2.63_BETA
    R7900 running firmware versions prior to 1.0.3.14_10.0.40_BETA
    R8000 running firmware versions prior to 1.0.4.38_10.1.59_BETA
    R8900 running firmware versions prior to v1.0.4.36_BETA
    R9000 running firmware versions prior to v1.0.4.36_BETA
    WNDR4300v2 running firmware versions prior to v1.0.0.60_BETA          
    WNDR4500v3 running firmware versions prior to v1.0.0.60_BETA

    The firmware versions that end in “_BETA” are security hotfixes. Security hotfixes are beta firmware created outside of normal development and testing processes. While the hotfixes do fix the security vulnerabilities identified above, they could negatively affect the regular operation of your device. Though our pre-deployment testing process did not indicate that these hotfixes would impact device operability, we always encourage our users to monitor their device closely after installing the firmware hotfix.
    NETGEAR strongly recommends that you download the latest firmware fixes or hotfixes for these product models as soon as possible.
    CVSS v3 Rating: High
    CVSS v3 Score: 8.8
    Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * I would suggest not running older firmware on XR routers unless its just for testing purposes and that you update to version 2.3.2.56 or 1.0.1.18_BETA to be safe
     
     
     
  16. Like
    Killhippie got a reaction from Mement in XR500 Firmware version 2.3.2.56 released.   
    When is the big bug fix coming?  I'm more interested in fixes to current issues tbh
  17. Like
    Killhippie got a reaction from Mement in XR500 Firmware version 2.3.2.56 released.   
    Does it include bug fixes for DumaOS in between milestone launches? Because all the new features in the world wont help if you don't patch the bugs that exist after updates, like the bugs that never got patched in milestone 1.3 and were not patched in the last update for some unknown reason, I mean Netduma did have 8 months to fix these.

     There has to be a change of direction in patching DumaOS bugs, there are still major bugs from December 2018, which result in people having to turn off QoS like the VLAN tagging bug for instance. These bugs are still causing people issues 8 months into Milestone 1.3 and that's after that's a recent update too. No new feature set in Milestone 1.4 will fix what is pretty much a non existent patching cycle for bugs in DumaOS. I really hope you have thought and worked on this aspect of DumaOS's life cycle in tandem with Netgear, otherwise nothing has really changed no matter what you add feature wise. Maybe you need to slow down creating new feature's and  concentrate on fixing the broken ones first?
  18. Like
    Killhippie got a reaction from e38BimmerFN in I got a weird minor issue   
    Now I have never heard of that, if its a ISP provided router they can update the firmware but your ISP is not going to be able to play with your routers UPnP on the LAN side unless they installed malware on your machine or their own equipment they sent you, not a Netgear router or any other make, the most they could do is a port scan or a line test. Can you provide a link to information that supports this 'Nebulous control of UPnP'?
  19. Like
    Killhippie got a reaction from Newfie in Security-Advisory-for-Remote-Kernel-Vulnerabilities on X500/700   
    NETGEAR has released firmware fixes or hotfixes for KCodes NetUSB unauthenticated remote kernel information disclosure and arbitrary memory read security vulnerabilities on the following product models:
    XR500 running firmware versions prior to v2.3.2.56
    XR700 running firmware versions prior to v1.0.1.18_BETA
    D6000 running firmware versions prior to v1.0.0.78
    D6400 running firmware versions prior to v1.0.0.88
    D7800 running firmware versions prior to v1.0.1.56
    DC112A running firmware versions prior to v1.0.0.44        
    EX6200 running firmware versions prior to v1.0.3.90         
    EX6200v2 running firmware versions prior to v1.0.1.78     
    EX8000 running firmware versions prior to v1.0.1.202       
    R6250 running firmware versions prior to v1.0.4.38_BETA
    R6400 running firmware versions prior to v1.0.1.50
    R7300DST running firmware versions prior to v1.0.0.74_BETA
    R7500v2 running firmware versions prior to v1.0.3.41_BETA
    R7800 running firmware versions prior to v1.0.2.63_BETA
    R7900 running firmware versions prior to 1.0.3.14_10.0.40_BETA
    R8000 running firmware versions prior to 1.0.4.38_10.1.59_BETA
    R8900 running firmware versions prior to v1.0.4.36_BETA
    R9000 running firmware versions prior to v1.0.4.36_BETA
    WNDR4300v2 running firmware versions prior to v1.0.0.60_BETA          
    WNDR4500v3 running firmware versions prior to v1.0.0.60_BETA

    The firmware versions that end in “_BETA” are security hotfixes. Security hotfixes are beta firmware created outside of normal development and testing processes. While the hotfixes do fix the security vulnerabilities identified above, they could negatively affect the regular operation of your device. Though our pre-deployment testing process did not indicate that these hotfixes would impact device operability, we always encourage our users to monitor their device closely after installing the firmware hotfix.
    NETGEAR strongly recommends that you download the latest firmware fixes or hotfixes for these product models as soon as possible.
    CVSS v3 Rating: High
    CVSS v3 Score: 8.8
    Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * I would suggest not running older firmware on XR routers unless its just for testing purposes and that you update to version 2.3.2.56 or 1.0.1.18_BETA to be safe
     
     
     
  20. Like
    Killhippie got a reaction from rww in XR500 Firmware version 2.3.2.56 released.   
    When is the big bug fix coming?  I'm more interested in fixes to current issues tbh
  21. Thanks
    Killhippie got a reaction from Netduma Alex in XR500 Firmware version 2.3.2.56 released.   
    Does it include bug fixes for DumaOS in between milestone launches? Because all the new features in the world wont help if you don't patch the bugs that exist after updates, like the bugs that never got patched in milestone 1.3 and were not patched in the last update for some unknown reason, I mean Netduma did have 8 months to fix these.

     There has to be a change of direction in patching DumaOS bugs, there are still major bugs from December 2018, which result in people having to turn off QoS like the VLAN tagging bug for instance. These bugs are still causing people issues 8 months into Milestone 1.3 and that's after that's a recent update too. No new feature set in Milestone 1.4 will fix what is pretty much a non existent patching cycle for bugs in DumaOS. I really hope you have thought and worked on this aspect of DumaOS's life cycle in tandem with Netgear, otherwise nothing has really changed no matter what you add feature wise. Maybe you need to slow down creating new feature's and  concentrate on fixing the broken ones first?
  22. Like
    Killhippie got a reaction from TurboFreak in XR500 Firmware version 2.3.2.56 released.   
    New Features and Enhancements:
    Support France Free and Orange ISP of the IPTV configuration. Support GUI login weak password protection. Bug Fixes:
    Fixes security vulnerability issues. Fixes the issue that cannot detect and prioritize game traffic of Fortnite Fixes the issue that in traffic prioritization, it can't detect "league of legend" traffic and some other pc games, such as Apex Legend, Monster Hunter and Rainbow Six Siege. Fixes the issue that the speedtest download speed result will be limited at 500Mbps Firmware Update Instructions:
    Download Link : http://www.downloads.netgear.com/files/GDC/XR500/XR500-V2.3.2.56.zip
  23. Like
    Killhippie got a reaction from raf1212 in XR500 Firmware version 2.3.2.56 released.   
    It’s a netgear router that runs DumaOS as well, netgear update the router as it’s their hardware. It needs updates from netgear  to patch security holes and to update drivers which netduma can’t do with DumaOS on this router as it’s not their hardware.  Also it was a turn of phrase too, because there were things that needed fixing in the netgear side of it while netduma work on milestone 1.4 
  24. Like
    Killhippie reacted to Grönis in Reinstall dumaos   
    Thank you!
     
    Thant did work, I didn't have turn on tftp in Windows, now is all good.
  25. Thanks
    Killhippie got a reaction from Fuzy in Reinstall dumaos   
    To use tftp you need a windows machine or the OS X client in the instructions from Netgear there is a link to downloading the OS X client. Not sure what version it supports or what you are running. I'm on Mojave 10.14.6 and it hasn't been called  OS X for a while now as its been renamed macOS. Normally you can just Just flash the Netgear firmware from within dd-wrt. then after it reboots, turn it off, then turn it on and reset it using the reset button in the back.

    https://kb.netgear.com/000059634/How-to-upload-firmware-to-a-NETGEAR-router-using-Windows-TFTP

    This link may help: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=264152&sid=9b4b574e36260b6083e8281f12fbfe68
     Its for a different Netgear router but the same principle applies, also check where you got your version of DD-WRT from for their instructions too.
     
×
×
  • Create New...