<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Router – Yeri Tiete</title><link>https://yeri.be/tag/router/</link><description>Yeri Tiete's blog</description><language>en</language><copyright>© Yeri Tiete</copyright><lastBuildDate>Fri, 26 Jun 2020 18:24:00 +0200</lastBuildDate><atom:link href="https://yeri.be/tag/router/index.xml" rel="self" type="application/rss+xml"/><item><title>Ideal travel router: GL-AR750S</title><link>https://yeri.be/ideal-travel-router-gl-ar750s/</link><pubDate>Fri, 26 Jun 2020 18:24:00 +0200</pubDate><author>Yeri Tiete</author><guid isPermaLink="true">https://yeri.be/ideal-travel-router-gl-ar750s/</guid><description>&lt;p&gt;Right. With the pandemic and all none of us are going to travel much but still...&lt;/p&gt;
&lt;p&gt;About a year ago I purchased myself an &lt;a class="aioseop-link" rel="noreferrer noopener" href="https://www.gl-inet.com/products/gl-ar750s/" target="_blank"&gt;OpenWRT router&lt;/a&gt; to use on the plane and in hotels.&lt;/p&gt;
&lt;p&gt;And so far I really like both the device and the Hong Kong based brand (launching new and updated products, and releasing relatively regular updates for older products). Pick a device that fits your needs (&lt;a href="https://www.gl-inet.com/products/gl-mt300n-v2/" target="_blank" rel="noreferrer noopener"&gt;USB powered&lt;/a&gt;? &lt;a href="https://www.gl-inet.com/products/gl-e750/" target="_blank" rel="noreferrer noopener"&gt;LTE&lt;/a&gt;? &lt;a href="https://www.gl-inet.com/products/vixmini/" target="_blank" rel="noreferrer noopener"&gt;Small form factor&lt;/a&gt;?). &lt;/p&gt;</description><content:encoded><![CDATA[<p>Right. With the pandemic and all none of us are going to travel much but still...</p>
<p>About a year ago I purchased myself an <a class="aioseop-link" rel="noreferrer noopener" href="https://www.gl-inet.com/products/gl-ar750s/" target="_blank">OpenWRT router</a> to use on the plane and in hotels.</p>
<p>And so far I really like both the device and the Hong Kong based brand (launching new and updated products, and releasing relatively regular updates for older products). Pick a device that fits your needs (<a href="https://www.gl-inet.com/products/gl-mt300n-v2/" target="_blank" rel="noreferrer noopener">USB powered</a>? <a href="https://www.gl-inet.com/products/gl-e750/" target="_blank" rel="noreferrer noopener">LTE</a>? <a href="https://www.gl-inet.com/products/vixmini/" target="_blank" rel="noreferrer noopener">Small form factor</a>?). </p>
<p>The GL-AR750S aka Slate is fully customizable but runs a few nice things out of the box: <a href="https://yeri.be/wireguard" target="_blank" rel="noreferrer noopener">WireGuard</a> (with a physical button to turn it on or off), <a href="https://yeri.be/tag/openvpn" target="_blank" rel="noreferrer noopener">OpenVPN</a>, shell access, Tor (requires the latest firmware), <a href="https://yeri.be/tag/ipv6" target="_blank" rel="noreferrer noopener">IPv6</a>, <a href="https://en.wikipedia.org/wiki/DNS_over_HTTPS" target="_blank" rel="noreferrer noopener">DoH</a> (<a href="https://web.archive.org/web/20210827100952/https://developers.cloudflare.com/1.1.1.1/dns-over-https" target="_blank" rel="noreferrer noopener">Cloudflare</a> only for now), multiple SSIDs (i.e. Guest WiFi), and more. </p>
<p>Oh and I specifically picked this version (compared to <a href="https://www.gl-inet.com/products/" target="_blank" rel="noreferrer noopener">other or cheaper ones</a>) because it had both 2.4Ghz and 5Ghz, as well as 3 Gbit ports (1x WAN, 2x LAN).</p>
<div class="wp-block-image"><figure class="aligncenter size-large"><a href="https://static.yeri.be/2020/06/glinet-compare-1.png" target="_blank" rel="noopener noreferrer"><img src="https://static.yeri.be/2020/06/glinet-compare-1-1024x694.png" alt="" class="wp-image-9088"/></a><figcaption>Pick whatever works for you...</figcaption></figure></div>
<p>I use the device on flights, where I connect to the network once in the air, purchase WiFi or use <a href="https://www.ipass.com/inflight-internet/" target="_blank" rel="noreferrer noopener">iPass</a> "for one device" and then connect to the interwebs behind my <a href="https://en.wikipedia.org/wiki/Network_address_translation" target="_blank" rel="noreferrer noopener">NAT</a>-router from my iPad, phone(s), laptop(s), and even <a href="https://yeri.be/shan-wong-sketching" title="Shan Wong sketching" target="_blank" rel="noreferrer noopener">Shan</a>'s devices if she is travelling with me.</p>
<p>In hotels, I either connect it to the wired ethernet, if still available (tends to be more stable), or connect it to the guest WiFi and then connect my devices to the router: saves me from connecting to a new network and typing the room number and login/password/family name on every device. And once again hides the true number of connected devices; quite handy trick for those pesky hotels providing free access only to two devices.</p>
<p>Sure it takes a bit of setup every time: find a working USB port, sign in to the web interface, search for new networks if this is a new hotel or I haven't travelled on this airline, connect to said network, sign in with iPass, and optionally enable VPN)...</p>
<p>And once in a while some fiddling with VPN or DNS that's borking up or being blocked by overzealous firewalls. </p>
<p>Also, some in-flight entertainment USB ports don't provide enough power (and/or are often broken -- looking at you Lufthansa in economy) so be sure to carry <a href="https://www.apple.com/shop/product/MD810LL/A/apple-5w-usb-power-adapter?fnode=83f41015933a91450d5764c4af01b7dcde6df42b8f2bd3d69b5785e0ebe48054e25d0a20aee428acbd11aa75bf2c77677833fecc12d57e28996bdafa64dfb0a43baa67bb1e79a1e51318f290bc482600cab20f21c35e5c95c94188846e9c860c366a443744dd092235bfa2928b330b8f&amp;fs=fh%3D458e%252B45d4" target="_blank" rel="noreferrer noopener nofollow sponsored">a couple of these</a> (US-plug works best) -- I've already forgotten one on my last flight from <a href="https://my.flightradar24.com/Tuinslak" target="_blank" rel="noreferrer noopener">MUC-SIN</a> on LH, but luckily I have pretty easy access to these. </p>
<p>If you travel a lot it's totally worth the money.</p>
]]></content:encoded><category>Hardware</category><category>Linux</category><category>Networking</category><category>Software</category><category>china</category><category>openvpn</category><category>openwrt</category><category>router</category><category>wifi</category><category>wireguard</category></item><item><title>NextDNS, EdgeOS and device names</title><link>https://yeri.be/nextdns-edgeos-and-device-names/</link><pubDate>Fri, 15 May 2020 13:02:00 +0200</pubDate><author>Yeri Tiete</author><guid isPermaLink="true">https://yeri.be/nextdns-edgeos-and-device-names/</guid><description>&lt;p&gt;Noticed that NextDNS was reporting old hostnames in the logs. For example old device names (devices that changed hostnames), devices that were definitely no longer on the network, or IPs that were matched to the wrong hostnames.&lt;/p&gt;
&lt;p&gt;The culprit is how EdgeOS deals with its &lt;a aria-label="hosts file (opens in a new tab)" href="https://en.wikipedia.org/wiki/Hosts_%28file%29" target="_blank" rel="noreferrer noopener" class="aioseop-link"&gt;hosts file&lt;/a&gt;. Basically it just keeps all the old hosts added and just adds a new line at the end of the file. &lt;/p&gt;</description><content:encoded><![CDATA[<p>Noticed that NextDNS was reporting old hostnames in the logs. For example old device names (devices that changed hostnames), devices that were definitely no longer on the network, or IPs that were matched to the wrong hostnames.</p>
<p>The culprit is how EdgeOS deals with its <a aria-label="hosts file (opens in a new tab)" href="https://en.wikipedia.org/wiki/Hosts_%28file%29" target="_blank" rel="noreferrer noopener" class="aioseop-link">hosts file</a>. Basically it just keeps all the old hosts added and just adds a new line at the end of the file. </p>
<p>NextDNS searches for the first valid entry in that file, which is always going to be an older record.</p>
<p>So the simplest solution I found was the turn off <code>hostfile-update</code> every so often. This clears the hosts file. </p>
<p>So <code>ssh</code> into the device, run <code>configure</code>, and then run these commands:</p>
<pre class="wp-block-code"><code>set service dhcp-server hostfile-update disable
commit
set service dhcp-server hostfile-update enable
commit
save</code></pre>
<h2 class="wp-block-heading">Update 22 Jun '23:</h2>
<p>Be sure to restart NextDNS, or it won't actually publish the up-to-date client hostnames.</p>
<pre class="wp-block-code"><code>sudo /config/nextdns/nextdns restart</code></pre>
]]></content:encoded><category>Linux</category><category>Networking</category><category>Software</category><category>dns</category><category>nextdns</category><category>router</category><category>ubiquiti</category></item><item><title>NextDNS + EdgeRouter + Redirecting DNS requests</title><link>https://yeri.be/nextdns-edgerouter-redirecting-dns-requests/</link><pubDate>Tue, 21 Apr 2020 18:14:00 +0200</pubDate><author>Yeri Tiete</author><guid isPermaLink="true">https://yeri.be/nextdns-edgerouter-redirecting-dns-requests/</guid><description>&lt;p&gt;Realised I haven't updated this in a long while (life happened).&lt;/p&gt;
&lt;p&gt;Couple of weeks ago I started to play with &lt;a href="http://nextdns.io" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link"&gt;NextDNS&lt;/a&gt; -- and I really recommend anyone that's something privacy minded and cares about the stuff happening on their network. &lt;/p&gt;
&lt;p&gt;I've set up several configs (home, parents, FlatTurtle &lt;a aria-label=" (opens in a new tab)" href="https://blog.flatturtle.com/image/103073818135" target="_blank" rel="noreferrer noopener" class="aioseop-link"&gt;TurtleBox&lt;/a&gt; (the NUCs controlling the &lt;a aria-label=" (opens in a new tab)" href="https://flatturtle.com/screens" target="_blank" rel="noreferrer noopener" class="aioseop-link"&gt;screens&lt;/a&gt;)) and Servers. Once it's out of beta and better supported on Unifi and Ubiquiti hardware I might deploy it to our &lt;a aria-label=" (opens in a new tab)" href="https://blog.flatturtle.com/image/101035897937" target="_blank" rel="noreferrer noopener" class="aioseop-link"&gt;public WiFi&lt;/a&gt; (well, most access points don't look like that -- but you get the point) networks too. &lt;/p&gt;</description><content:encoded><![CDATA[<p>Realised I haven't updated this in a long while (life happened).</p>
<p>Couple of weeks ago I started to play with <a href="http://nextdns.io" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">NextDNS</a> -- and I really recommend anyone that's something privacy minded and cares about the stuff happening on their network. </p>
<p>I've set up several configs (home, parents, FlatTurtle <a aria-label=" (opens in a new tab)" href="https://blog.flatturtle.com/image/103073818135" target="_blank" rel="noreferrer noopener" class="aioseop-link">TurtleBox</a> (the NUCs controlling the <a aria-label=" (opens in a new tab)" href="https://flatturtle.com/screens" target="_blank" rel="noreferrer noopener" class="aioseop-link">screens</a>)) and Servers. Once it's out of beta and better supported on Unifi and Ubiquiti hardware I might deploy it to our <a aria-label=" (opens in a new tab)" href="https://blog.flatturtle.com/image/101035897937" target="_blank" rel="noreferrer noopener" class="aioseop-link">public WiFi</a> (well, most access points don't look like that -- but you get the point) networks too. </p>
<p>Looking at the logs was an eye-opener seeing what goes through your network. You can play around and block (or whitelist) certain domains. </p>
<figure class="wp-block-image size-large"><a href="https://static.yeri.be/2020/04/nextdns_0x04.png" target="_blank" rel="noopener noreferrer"><img src="https://static.yeri.be/2020/04/nextdns_0x04-902x1024.png" alt="" class="wp-image-8310"/></a></figure>
<p>I figured out my <a href="https://www.devialet.com" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">Devialet</a> does an insane amount of requests to <a href="http://cache.radioline.fr" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">cache.radioline.fr</a> for example. This domain has a 30s TTL. It shows that the majority of my DNS requests are actually automated pings and not in any way human traffic. </p>
<p>Anyhow -- I've since installed the <a href="https://github.com/nextdns/nextdns/wiki/EdgeOS" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">NextDNS CLI</a> straight on my <a href="https://yeri.be/edgerouter-fritzbox-ipsec" class="aioseop-link">EdgeRouter</a> Lite acting as a caching DNS server and forwarding using <a href="https://en.wikipedia.org/wiki/DNS_over_HTTPS" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">DoH</a>. </p>
<p>I've turned off dnsmasq (<code>/etc/default/dnsmasq</code> =&gt; <code>DNSMASQ_OPTS="-p0"</code>) and have NextDNS listen to :53 directly. </p>
<p>Note that every EdgeOS update seems to wipe out the NextDNS installation, and requires a fresh install... Pain in the ass and doesn't seem like that's fixable. </p>
<p>This is my ERL NextDNS config (<code>/etc/nextdns.conf</code>)</p>
<pre class="wp-block-preformatted">hardened-privacy false
bogus-priv true
log-queries false
cache-size 10MB
cache-max-age 0s
report-client-info true
timeout 5s
listen :53
use-hosts true
setup-router false
auto-activate true
config 34xyz8
detect-captive-portals false
max-ttl 0s</pre>
<p>The explanation of every flag is explain on their <a href="https://github.com/nextdns/nextdns/" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">Github</a> page and they are very responsive via issues or through their chat on <a href="http://my.nextdns.io" target="_blank" aria-label="my.nextdns.io (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">my.nextdns.io</a>.  </p>
<p>All right -- next thing I've noticed is that my Google Home devices are not sending any DNS requests -- which means the devices use hard coded DNS servers. </p>
<p>I have a separate vlan (<code>eth1.90</code>) for Google Home (includes my Android TV, <a aria-label=" (opens in a new tab)" href="https://osmc.tv/" target="_blank" rel="noreferrer noopener" class="aioseop-link">OSMC</a>, Nest Home Hub and all other GHome and Chromecast devices). For this vlan I set up a deflector to be able to cast and ping/ssh from my "main" network/vlan to GHome vlan. </p>
<p>Using <a href="https://iperf.io/2019/12/27/intercept-and-redirect-dns-requests/" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">this guide</a> I redirected all external DNS traffic to the ERL so I can monitor what's happening. The important part was the following:</p>
<pre class="wp-block-preformatted">yeri@sg-erl# show service nat rule 4053<br />destination {<br />port 53<br />}<br />inbound-interface eth1.90<br />inside-address {<br />address 10.3.34.1<br />port 53<br />}<br />protocol tcp_udp<br />type destination</pre>
<p>This allows to "catch" all UDP and TCP connections to :53 and redirect them the ERL DNS server (10.3.34.1). The GHome devices were acting a bit weird after committing the change, but a reboot of the device fixed it. </p>
<p>Note that you need to set this up per vlan. If you want to catch DNS requests for your Guest or IoT vlan, you'll need to do the same. </p>
]]></content:encoded><category>Google</category><category>Linux</category><category>Networking</category><category>debian</category><category>dns</category><category>nextdns</category><category>router</category><category>ubiquiti</category></item><item><title>Linux gateway/router + unable to access certain (HTTPS) sites</title><link>https://yeri.be/linux-gatewayrouter-unable-to-access-certain-https-sites/</link><pubDate>Sat, 27 Feb 2010 13:56:47 +0100</pubDate><author>Yeri Tiete</author><guid isPermaLink="true">https://yeri.be/linux-gatewayrouter-unable-to-access-certain-https-sites/</guid><description>&lt;p&gt;I&amp;rsquo;ve had an issue for a while, being unable to access certain websites such as &lt;a href="https://fon.com" target="_blank"&gt;&lt;a href="https://fon.com"&gt;https://fon.com&lt;/a&gt;&lt;/a&gt;, but also certain parts of the Apple, Fortis and Microsoft site, while other (https) websites worked fine.&lt;/p&gt;
&lt;p&gt;Running Wireshark I found that only about 5ish packets got transferred, and all other data to that website abruptly stopped.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m using ADSL (&lt;a href="http://www.edpnet.be/" target="_blank"&gt;EDPnet&lt;/a&gt;), which has an MTU of 1492, however, I was able to access all websites from the router (using lynx, for example), but not from any other PC within the network.&lt;/p&gt;</description><content:encoded><![CDATA[<p>I&rsquo;ve had an issue for a while, being unable to access certain websites such as <a href="https://fon.com" target="_blank"><a href="https://fon.com">https://fon.com</a></a>, but also certain parts of the Apple, Fortis and Microsoft site, while other (https) websites worked fine.</p>
<p>Running Wireshark I found that only about 5ish packets got transferred, and all other data to that website abruptly stopped.</p>
<p>I&rsquo;m using ADSL (<a href="http://www.edpnet.be/" target="_blank">EDPnet</a>), which has an MTU of 1492, however, I was able to access all websites from the router (using lynx, for example), but not from any other PC within the network.</p>
<pre># ifconfig<span style="color: #ff0000;"> ppp0</span>
ppp0      Link encap:Point-to-Point Protocol
inet addr:85.234.196.57  P-t-P:85.234.196.1  Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST  <span style="color: #ff0000;">MTU:1492</span> Metric:1
RX packets:38804442 errors:0 dropped:0 overruns:0 frame:0
TX packets:28930886 errors:0 dropped:5020 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:45941523311 (42.7 GiB)  TX bytes:2887926670 (2.6 GiB)</pre>
<p style="padding-left: 60px;"><span style="color: #000000;"> </span></p>
As it had worked before without any issues, I was more thinking about a kernel problem (or a module of it), however, stripping down unnecessary modules and updating my kernel a few times didn't resolve the issue. I even booted an old kernel I had still lying around from when I could access the websites. However, all these attempts were in vain.
<p>Thinking it might have been a firewall issue, I flushed all my iptables rules, and started over from scratch. However, this too didn&rsquo;t solve my issue.</p>
<p>When I VPN&rsquo;ed or used my Macbook Pro directly as PPPoE device (by-passing the Gentoo router) I was able to access all the websites as well.</p>
<p>After being close to giving up, I found the following iptables rule:</p>
<pre>iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu -t mangle</pre>
<p>And try again.</p>
<p>This did solve my issue. :)</p>
<p>This is because the default 100mbit MTU is 1500, instead of 1492 for PPPoE.</p>
<div id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;">http://www.edpnet.be/</div>
]]></content:encoded><category>Errors</category><category>Linux</category><category>Networking</category><category>Linux</category><category>https</category><category>mtu</category><category>router</category></item></channel></rss>