Jump to content

Johnny Aywah

Members
  • Content Count

    14
  • Joined

  • Last visited

About Johnny Aywah

  • Rank
    New

Basic Info

  • DumaOS Routers Owned
    XR500
  1. ah, so i need to find a setting to enable this? any idea what protocol this might be?
  2. tough to explain but have a look I've labeled the device 'Switch' (as I assume it is) has one mac address and multiple IP belonging to my various wifi devices is this expected behavior? was like this out of the box and with box .40 and .56 firmware
  3. amusingly, i updated to the latest Netgear FW and this feature now seems to be working correctly I did not think Netgear code had any impacts on how Duma OS operates FYI, FW version number is still showing as .40 not .56 despite the gui telling me im on.56 when i look for new firmware
  4. no it does, i just didnt paste it in, do you need the cert as well? should the PULL command in the OPENVPN config not default all sessions through the tunnel?
  5. Sure thing, and thanks client remote los.tigervpn.com 1194 udp remote los.tigervpn.com 443 tcp-client pull auth-user-pass auth-nocache comp-lzo adaptive ca ca.crt dev tun tls-client script-security 2 cipher AES-256-CBC mute 10 route-delay 5 redirect-gateway def1 resolv-retry infinite #dhcp-renew #dhcp-release persist-key persist-tun remote-cert-tls server mssfix
  6. here you go...and thanks! EDIT: adding HybridVPN logs Wed Aug 14 23:24:46 2019 OpenVPN 2.4.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Nov 29 2018 Wed Aug 14 23:24:46 2019 library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.06 Wed Aug 14 23:24:46 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Wed Aug 14 23:24:47 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]162.220.221.42:1194 Wed Aug 14 23:24:47 2019 Socket Buffers: R=[163840->163840] S=[163840->163840] Wed Aug 14 23:24:47 2019 UDP link local (bound): [AF_INET][undef]:1194 Wed Aug 14 23:24:47 2019 UDP link remote: [AF_INET]162.220.221.42:1194 Wed Aug 14 23:24:47 2019 TLS: Initial packet from [AF_INET]162.220.221.42:1194, sid=f6767b5a 02786d16 Wed Aug 14 23:24:47 2019 VERIFY OK: depth=1, C=SK, ST=Bratislava, L=Bratislava, O=Tiger At Work & Co. k. s., OU=tigerVPN, CN=tigerVPN, name=tigerVPN, [email protected] Wed Aug 14 23:24:47 2019 VERIFY KU OK Wed Aug 14 23:24:47 2019 Validating certificate extended key usage Wed Aug 14 23:24:47 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Aug 14 23:24:47 2019 VERIFY EKU OK Wed Aug 14 23:24:47 2019 VERIFY OK: depth=0, C=SK, ST=Bratislava, L=Bratislava, O=Tiger At Work & Co. k. s., OU=tigerVPN, CN=tigervpn.com, name=tigerVPN, [email protected] Wed Aug 14 23:24:47 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Wed Aug 14 23:24:47 2019 [tigervpn.com] Peer Connection Initiated with [AF_INET]162.220.221.42:1194 Wed Aug 14 23:24:48 2019 SENT CONTROL [tigervpn.com]: 'PUSH_REQUEST' (status=1) Wed Aug 14 23:24:53 2019 SENT CONTROL [tigervpn.com]: 'PUSH_REQUEST' (status=1) Wed Aug 14 23:24:53 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 162.220.221.43,route-gateway 100.97.0.1,topology subnet,ping 10,ping-restart 30,ifconfig 100.97.0.48 255.255.0.0,peer-id 70,cipher AES-256-GCM' Wed Aug 14 23:24:53 2019 OPTIONS IMPORT: timers and/or timeouts modified Wed Aug 14 23:24:53 2019 OPTIONS IMPORT: --ifconfig/up options modified Wed Aug 14 23:24:53 2019 OPTIONS IMPORT: route options modified Wed Aug 14 23:24:53 2019 OPTIONS IMPORT: route-related options modified Wed Aug 14 23:24:53 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Aug 14 23:24:53 2019 OPTIONS IMPORT: peer-id set Wed Aug 14 23:24:53 2019 OPTIONS IMPORT: adjusting link_mtu to 1625 Wed Aug 14 23:24:53 2019 NOTE: --mute triggered... Wed Aug 14 23:24:53 2019 1 variation(s) on previous 10 message(s) suppressed by --mute Wed Aug 14 23:24:53 2019 Data Channel: using negotiated cipher 'AES-256-GCM' Wed Aug 14 23:24:53 2019 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Aug 14 23:24:53 2019 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Aug 14 23:24:53 2019 TUN/TAP device tun0 opened Wed Aug 14 23:24:53 2019 TUN/TAP TX queue length set to 100 Wed Aug 14 23:24:53 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Wed Aug 14 23:24:53 2019 /sbin/ifconfig tun0 100.97.0.48 netmask 255.255.0.0 mtu 1500 broadcast 100.97.255.255 Wed Aug 14 23:24:53 2019 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpnup 6 tun0 1500 1553 100.97.0.48 255.255.0.0 init Wed Aug 14 23:24:58 2019 Initialization Sequence Completed
  7. Hi there, do you mean "Do Not VPN these services?" I have already selected this
  8. last thing you want to do is Double NAT Having your XR500 do all the routing is the best solution, how many devices are you running that you want to unclutter your device manager view?
  9. Hi guys, Finally got my config right, GUI says I am connected and my TigerVPN console says i have an established session have added to PCs to the device list, but as far as ai can see, none of that traffic is actually beinf routed through the VPN tunnel Have I missed something?
  10. I'm hearing 3 more months or so Looking forward to it!!!
  11. suspect this is part of the netgear portion of the code, ive seen similiar issues on other netgear non-DUMAOS devices
×
×
  • Create New...