Jump to content

Recommended Posts

Thanks for the ticket information, I'll pass that on to our team who take care of testing. 

Could you change the R1 DNS to the same DNS as PureVPN and see if that resolves the issue please.

Share this post


Link to post
Share on other sites
4 hours ago, Netduma Fraser said:

Thanks for the ticket information, I'll pass that on to our team who take care of testing. 

Could you change the R1 DNS to the same DNS as PureVPN and see if that resolves the issue please.

Fraser........ I'm in the Nighthawk forum. Are you trolling me right now?

 

Yes I will see if I can make changes to the DNS. 

Share this post


Link to post
Share on other sites

So basically I've had 3 days of good servers and no real issues.  Today it's back to the pre-vpn frequency. It's like the filter took awhile to narrow down where I was located and which servers I prefer and starts fucking with me again. This is beyond useful. How can I be connecting a an obviously blocked server if the filter is on and has NEVER been off?  Once I get it working well I generally leave it filtered. There is nothing else connected to that ISP but my pc to control the router if changes are needed.  Right back to square one with this POS. More matches than not are outside the filtered range and then I get kicked to the start menu, LOBBY UNAVAILABLE because the filter finally decides to block it.  FUCK ME

Bullshit is back (2).png

Share this post


Link to post
Share on other sites

Sorry, I just meant could you change the DNS to match, R1 was a slip. 

That looks like either it's whitelisted from the cloud side or it was denied after a connection was made, or was it one you've denied a long time ago?

Share this post


Link to post
Share on other sites
21 hours ago, Netduma Fraser said:

Sorry, I just meant could you change the DNS to match, R1 was a slip. 

That looks like either it's whitelisted from the cloud side or it was denied after a connection was made, or was it one you've denied a long time ago?

Its fine, just giving you shit. Is that referred to as 'taking the piss?' 😁

I believe pureVPN uses 8.8.8.8 or 208.67.222.222 someone correct me if I'm wrong. I am using 8.8.8.8 already. 

The server is one that's been on my list for quite awhile since the most recent router reset frenzy.  What you've mentioned though, " or it was denied after a connection was made," is exactly how all of our filters are behaving that have complained about the filter. It is allowing you to connect to banned servers and then it finally bans it after you are already connecting to the lobby so you basically appear to the game to leave the match and forfeit. With error message in game lobby is no longer available or similar. 

Another thing it's doing is half the time it chooses a server outside of the range like the one displayed above, it will be one that's in my DENY list but still shows a yield sign vs. the blocked sign. Seems to be just outright broken. It does all of this with or without vpn now. Why?

Share this post


Link to post
Share on other sites

ok so check this out. since I have been testing this with vpn I have noticed that my allow/deny list is basically only good for your existing IP.  So if you create a list of friends to ALLOW. And your IP changes, which I can do with a vpn easily, those same allowed friends are not allowed and show as a yield sign as if they have never been Identified before and added to the list. I can then click on their ping icon from the allow list, allow them, and it will let them in the lobby with me or chat party without NAT restrictions. So whatever is causing my issue has something to do with that. Before my IP wasn't changing but for some reason it acts identical to as if it were. Make sense? 

And it's not just me it's several other users in this forum. 

These are the shared common instances that have been posted and unanswered. 

-Servers being allowed form outside the filter range

-Denied servers from the deny list being allowed

-Nat restrictions; intermittently with party and or game

-servers within the filtered range being skipped over or blocked entirely

-servers on the allow list being skipped over or blocked entirely inside filtered range

-servers on the allow list being skipped over or blocked entirely outside filtered range

-servers within the threshold of Ping Assist being skipped over or blocked entirely inside filter range

-servers within the threshold of Ping Assist being skipped over or blocked entirely outside filter range

-servers outside the threshold of Ping Assist being allowed outside filter range

 

 

 

Share this post


Link to post
Share on other sites

Haha it is!

I don't think that's correct, use this table to find the server you're using https://support.purevpn.com/vpn-servers#  then use the addresses from the OpenVPN column with this guide https://support.purevpn.com/how-to-get-server-ip-or-convert-hostdomain-name-to-ip-address# for the DNS IPs that you can use on the router, see if that resolves it. 

I can't really explain that at all, theres no scenario that I can think of that we haven't already covered that would explain it. Thanks for the summary as well, I'm updating the team on this so they can take a look.

Share this post


Link to post
Share on other sites
46 minutes ago, Netduma Fraser said:

Haha it is!

I don't think that's correct, use this table to find the server you're using https://support.purevpn.com/vpn-servers#  then use the addresses from the OpenVPN column with this guide https://support.purevpn.com/how-to-get-server-ip-or-convert-hostdomain-name-to-ip-address# for the DNS IPs that you can use on the router, see if that resolves it. 

I can't really explain that at all, theres no scenario that I can think of that we haven't already covered that would explain it. Thanks for the summary as well, I'm updating the team on this so they can take a look.

😁

Are you sure? From what I'm reading in those two links I only see taking the hostname for my udp server and converting it to an IP. I can't find the spot where it says here is the DNS. Should I just use the gateway IP as the DNS?

Thanks

Share this post


Link to post
Share on other sites

I believe so for example if you're using the Houston VPN server via UDP you have ustx2-ovpn-udp.pointtoserver.com which translates to 45.74.60.4 so you would use that as your DNS if I've understood correctly.

Share this post


Link to post
Share on other sites
1 hour ago, Netduma Fraser said:

I believe so for example if you're using the Houston VPN server via UDP you have ustx2-ovpn-udp.pointtoserver.com which translates to 45.74.60.4 so you would use that as your DNS if I've understood correctly.

OK. I've done that for the last 45 minutes, were on the same page. But the only place to use it is with either the ps4 or router and in the router I can only add it as the WAN DNS. This resulted in this message over and over. "The operation is taking longer than expected. Please briefly wait before using this R-App."  On the filter page. 

Share this post


Link to post
Share on other sites
17 minutes ago, Netduma Fraser said:

Remove DNS then remove the device from the Geo-Filter then redo the DNS and then add the device again, does that work?

This does not work either. Same message and once it starts doing that, everything slows down it's taking 30-45 seconds for the hybrid vpn page to even be displayed also after about 15 minutes the vpn tunnel is disconnected and won't reconnect. 

Share this post


Link to post
Share on other sites
On 5/10/2019 at 6:00 PM, Netduma Fraser said:

Sorry, I just meant could you change the DNS to match, R1 was a slip. 

That looks like either it's whitelisted from the cloud side or it was denied after a connection was made, or was it one you've denied a long time ago?

Fraser I honestly think it has nothing to do with the setup or what dns etc..  I feel 90% confident that the issues is within something that has been changed for the backend on the OS.  It's almost like when an IP changes it works for a bit then after it learns all of your habits it starts working against you. I can change the IP with the VPN at will by changing servers. Wipe the Allow/Deny list. Start an entirely new list for that geo location, let's say Chicago now. The first 1-3 days everything is beautiful. After that it's right back to the same song and dance as before the VPN. It learns your range, you provide detail after detail with allow/deny and preffered latency them WHAM... blocking your normal servers within range or within PA and choosing outside of both set parameters.  Once I get it set I have no use to tinker with turning the filter off and on. I am familiar enough to know where the server locations are as well as new ser IP are lost/added and PA can come in handy to allow those outside of the range due to age of IP and not being added to the cloud with the correct location because they are new or whatever reason. So by that setup with no changes until things go south, in theory my setup should never "go bad" due to user errors or the filter not being in use quick enough or booting the game with it on vs off since it's always on. 

I have tested this by changing firs tto the VPn to rule out an issue with my CGNAT from ISP as well as to move my IP at will.  I have now tested again moving from Dallas server and IP to Houston and it was the exact same scenario. A few days in and the filter creates it's own errors. 

Share this post


Link to post
Share on other sites

Closed alternate thread to keep everything in one place. Here's what was written in the alternate thread:

11 hours ago, stalker4hire- said:

Please don't close this until it's resolved just saying a bunch of words that don;t even apply to my issue is not a remedy. 

Using hybrid VPN to run through different scenarios today why do I keep getting a connected then after a few minutes failed? 

I'm trying to test in London today. This failure is exact same message minus the fact it is for Manchester.

Things connect with warning then disconnect. I can use PureVPN app and stay connected but that doesn't help me when trying to use the router feature. This happens with all servers in UK for me today. 

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Sun May 12 22:32:31 2019 OpenVPN 2.4.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 17 2019 Sun May 12 22:32:31 2019 library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.06 Sun May 12 22:32:31 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 12 22:32:31 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun May 12 22:32:31 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]172.111.186.2:53 Sun May 12 22:32:31 2019 UDP link local: (not bound) Sun May 12 22:32:31 2019 UDP link remote: [AF_INET]172.111.186.2:53 Sun May 12 22:32:31 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sun May 12 22:32:34 2019 [PureVPN] Peer Connection Initiated with [AF_INET]172.111.186.2:53 Sun May 12 22:32:37 2019 TUN/TAP device tun0 opened Sun May 12 22:32:37 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Sun May 12 22:32:37 2019 /sbin/ifconfig tun0 172.111.186.131 netmask 255.255.255.192 mtu 1500 broadcast 172.111.186.191 Sun May 12 22:32:37 2019 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpnup 3 tun0 1500 1558 172.111.186.131 255.255.255.192 init Sun May 12 22:32:39 2019 Initialization Sequence Completed Sun May 12 22:34:37 2019 [PureVPN] Inactivity timeout (--ping-restart), restarting Sun May 12 22:34:37 2019 SIGUSR1[soft,ping-restart] received, process restarting Sun May 12 22:34:42 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 12 22:34:42 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun May 12 22:34:42 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]172.111.186.2:53 Sun May 12 22:34:42 2019 UDP link local: (not bound) Sun May 12 22:34:42 2019 UDP link remote: [AF_INET]172.111.186.2:53 Sun May 12 22:34:48 2019 [PureVPN] Peer Connection Initiated with [AF_INET]172.111.186.2:53 Sun May 12 22:35:03 2019 Preserving previous TUN/TAP instance: tun0 Sun May 12 22:35:03 2019 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device. Sun May 12 22:35:03 2019 /sbin/ifconfig tun0 0.0.0.0 Sun May 12 22:35:03 2019 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpndown 3 tun0 1500 1558 172.111.186.131 255.255.255.192 init openvpn-event.lua: bad argument #3 to 'format' (string expected, got nil) -> stack traceback: ?: in function <?:73> [C]: in function 'format' ?: in function 'safe_execute' ?: in function '?' ?: in function 'on_vpn_down' ?: in function 'on_vpn_down' ?: in function '?' ?: in function '?' ?: in function '?' ?: in function <?:48> [C]: in function 'xpcall' ... [C]: in function 'run' ?: in function <?:345> [C]: in function 'xpcall' ?: in function 'try' ?: in function <?:261> (tail call): ? /dumaos/api/cli.lua:48: in function </dumaos/api/cli.lua:30> [C]: in function 'xpcall' /dumaos/api/cli.lua:59: in main chunk [C]: ? Sun May 12 22:35:03 2019 WARNING: Failed running command (--up/--down): external program exited with error status: 3 Sun May 12 22:35:03 2019 Exiting due to fatal error

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 

Share this post


Link to post
Share on other sites
9 hours ago, Netduma Alex said:

Closed alternate thread to keep everything in one place. Here's what was written in the alternate thread:

 

These are two separate issues but whatever.

Share this post


Link to post
Share on other sites

Also, can I get an answer on why Port Forwarding does NOT work ONLY with the DumaOS hybrid VPN? Hopefully Alex you read the post, since you're combining them, you seem to have an issue with comprehension. Earlier posts you literally posted a link to explain how to use the advanced tab to connect when I said there was an issue within the Hyrbid VPN for selecting Houston UDP. The very post before yours shows that I stated I was already connected with the advanced tab and a config file work around. It would help the matter along if everyone involved was trying to offer actual solutions versus adding links from the same resources we all have. All of the issues that have gone unanswered for those of us having issues with hybridVPN and GeoFilter are something outside of the box, not to be answered by documentation that still shows these items functioning normally for all, they don't. 

 

Share this post


Link to post
Share on other sites

Could you provide a paste of the exact config that you're using please so I can take a look? 

Okay so here is a weird workaround for the server issue, not ideal I know but I do not know what could be causing the issue, it requires a dev input in my opinion. Find the server IP that you want to consistently connect to from the Geo-Filter then follow the video here: 

 does that work at all?

Whats the exact port forwarding rule you're using? It may be set the wrong way round, i.e. src port you have should actually be dst for example

If that's it then I'm not sure why that would be happening, have you tried triggering as well?

Share this post


Link to post
Share on other sites
On 5/14/2019 at 1:21 PM, Netduma Fraser said:

Could you provide a paste of the exact config that you're using please so I can take a look? 

Okay so here is a weird workaround for the server issue, not ideal I know but I do not know what could be causing the issue, it requires a dev input in my opinion. Find the server IP that you want to consistently connect to from the Geo-Filter then follow the video here: 

 does that work at all?

Whats the exact port forwarding rule you're using? It may be set the wrong way round, i.e. src port you have should actually be dst for example

If that's it then I'm not sure why that would be happening, have you tried triggering as well?

Thanks for the reply Fraser, I will try the above. 

Also here is the exact config. 

client
verb 1
proto udp
remote ustx2-ovpn-udp.pointtoserver.com 5500 
connect-retry-max 3
connect-retry 3
resolv-retry 15
dev tun
auth-user-pass
persist-key
persist-tun
nobind
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMbJ8p+L+scQz57g
2mEtG/TNTfJ8YIOzgTwZSvhVkcXU0PMsbeVOQmRpu64lae38mtidoj2SIJh0BL/y
m8c7bBwFZWEn2GJWpa54RC92wz9rWPjeNwMAdZOQaz6trNaTy09lxvedXawyhuD1
LhR1D9bB81uaEJX1QpsYCDAD/DmJAgMBAAECgYEAvTHbDupE5U0krUvHzBEIuHbl
ptGlcfNYHoDcD3oxYR3pOGeiuElBexv+mgHVzcFLBrsQfJUlHLPfCWi3xmjRvDQc
r7N7U1u7NIzazy/PpRBaKolMRiM1KMYi2DG0i4ZONwFT8bvNHOIrZzCLY54KDrqO
n55OzC70WYjWh4t5evkCQQDkkzZUAeskBC9+JP/zLps8jhwfoLBWGw/zbC9ePDmX
0N8MTZdcUpg6KUTf1wbkLUyVtIRjS2ao6qu1jWG6K0x3AkEA3qPWyaWQWCynhNDq
u2U1cPb2kh5AJip+gqxO3emikAdajsSxeoyEC2AfyBITbeB1tvCUZH17J4i/0+OF
TEQp/wJAb/zEOGJ8PzghwK8GC7JA8mk51DEZVAaMSRovFv9wxDXcoh191AjPdmdz
zCuAv9iF1i8MUc3GbWoUWK39PIYsPwJAWh63sqfx5b8tj/WBDpnJKBDPfhYAoXJS
A1L8GZeY1fQkE+ZKcPCwAmrGcpXeh3t0Krj3WDXyw+32uC5Apr5wwQJAPZwOORea
C4YNfBPZN9BdHvVjOYGGUffpI+X+hWpLRnQFJteAi+eqwyk0Oi0SkJB+a7jcerK2
d7q7xhec5WHlng==
-----END PRIVATE KEY-----
</key>
<tls-auth>

# 2048 bit OpenVPN static key 

-----BEGIN OpenVPN Static key V1-----
e30af995f56d07426d9ba1f824730521
d4283db4b4d0cdda9c6e8759a3799dcb
7939b6a5989160c9660de0f6125cbb1f
585b41c074b2fe88ecfcf17eab9a33be
1352379cdf74952b588fb161a93e13df
9135b2b29038231e02d657a6225705e6
868ccb0c384ed11614690a1894bfbeb2
74cebf1fe9c2329bdd5c8a40fe882062
4d2ea7540cd79ab76892db51fc371a3a
c5fc9573afecb3fffe3281e61d72e915
79d9b03d8cbf7909b3aebf4d90850321
ee6b7d0a7846d15c27d8290e031e951e
19438a4654663cad975e138f5bc5af89
c737ad822f27e19057731f41e1e254cc
9c95b7175c622422cde9f1f2cfd3510a
dd94498b4d7133d3729dd214a16b27fb
-----END OpenVPN Static key V1-----
</tls-auth>
key-direction 1
remote-cert-tls server
cipher AES-256-CBC
comp-lzo
route-method exe 
route-delay 2 
route 0.0.0.0 0.0.0.0
script-security 2

Share this post


Link to post
Share on other sites

So if I am looking at this correctly then what this guy did was create a static route for a particular server IP. Which, with his game, may be the only server in that region?  For Cod there could be 20+ IP from different ranges even just for one data center or server cluster. 

Also tonight I reinstalled MWR and had zero issues. I am going to play just MWR for the next few days and see if the issues appears over time as it seems to with bo4:blackout. 

Share this post


Link to post
Share on other sites

Sun May 12 22:32:31 2019 OpenVPN 2.4.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 17 2019 Sun May 12 22:32:31 2019 library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.06 Sun May 12 22:32:31 2019

Looking at this I wonder if any issues are based on the use of OpenVPN 2.4.3 when the latest is 2.4.7 along with OpenSSL1.0.2n being well over years old. This is what concerns me sometimes with Netgear and their very out of date packages and compatibility with some VPN providers, I may be well of course but the R7800's OpenVPN works very well running the latest updates if you use Voxels firmware (fork of Netgears) Using up to date code does seem to make for a lot less issues, just a thought. Hope it all works out.

Share this post


Link to post
Share on other sites

I've edited the config, could you see if this works?:

client

verb 1
proto udp
remote ustx2-ovpn-udp.pointtoserver.com 5500 
connect-retry-max 3
connect-retry 3
resolv-retry 15
dev tun
auth-user-pass
persist-key
persist-tun
nobindkey-direction 1
remote-cert-tls server
cipher AES-256-CBC
comp-lzo
route-method exe 
route-delay 2 
route 0.0.0.0 0.0.0.0
script-security 2
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
</key>

There's rarely just one IP in a cluster like you've said, just thought it could be worth a try.

Share this post


Link to post
Share on other sites

The geofilter is now not doing anything.

It's been ON for days now and all of the sudden it started allowing servers that are on my list as DENY and have been for weeks or even servers that aren't on my list at all it shows them as ALLOWED. Servers all over the US, like I don't even have a DENY list or the filter ON.  This is beyond retarded. If the main feature of the router doesn't work then....

 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×
×
  • Create New...