Quantcast
Channel: MyOpenRouter
Viewing all 281 articles
Browse latest View live

Error Log?

$
0
0
Hi guys, Have been making changes to my DNS settings and now have the following errors in my Syslog: 2014-09-30 20:30:00 user.warning rstats[5204]: Problem loading /cifs1/tomato_rstats_c404152c9617.gz. Still trying...\n and 2014-09-30 20:13:52 kernel.notice kernel: Status code returned 0xc000006d NT_STATUS_LOGON_FAILURE\n Any clues? - I've reset the router and reverted my changes but still get these errors - when I click on any of the log menu options they now just open with a blank page... Thanks

No Graphs?

$
0
0
Hi guys, Recent convert to Tomato, but no graphs visible - I get the gridlines, but no detail in the graph itself - I did read issues with Firefox, but I've tried IE and Chrome from a Win7 PC, Safari from a Mac, and Safari from an iPad - no change, any clues?

how to flash tomato usb firmware to Asus rt-ac68w wireless router for cyberghostvpn

$
0
0
Hello, How do I flash tomato usb firmware to a Asus RT-AC68W wireless router. I have been told that the rt-ac68w and the RT-AC68U are the same on using merlins firmware. Is it the same thing for tomato usb firmware updates and how do I flash my router. I am going to get cyberghostvpn and would like to put there software on my router. I need to change to tomato usb firmware first. On flash firmware routers they made a claim that they enabled the full 256 of ram. I have no way to confirm that. But I was told if I wanted extra features that I should switch to DD-WRT or tomato usb firmware. Any help would be great.

Are there plans for a version for the R8000?

$
0
0
Trying to figure out if I should hold off on purchasing or look for a different router. Thanks.

DNSCrypt Problems

$
0
0
Hallo, During the last days I wastrying to get DNScrypt working in my Tomato Shibby Router, but in my Wireshark Logs i am still seeing unencrypted Request. My Router Log looks as follows: Now my question: Is it OK to still see unencrypted Requests to my router as they will just be encrypted from the router->opendns or do i need to enable/set something up on my (Windows) client side ? Thanks in advance! I have s witched off "Use received DNS with user-entered DNS". Oct 17 09:06:53 rIngo daemon.info dnscrypt-proxy[774]: Refetching server certificates Oct 17 09:06:53 rIngo daemon.info dnscrypt-proxy[774]: Server certificate #1408041567 received Oct 17 09:06:53 rIngo daemon.info dnscrypt-proxy[774]: This certificate looks valid Oct 17 09:06:53 rIngo daemon.info dnscrypt-proxy[774]: Chosen certificate #1408041567 is valid from [2014-08-15] to [2015-08-15] Oct 17 09:06:53 rIngo daemon.info dnscrypt-proxy[774]: Server key fingerprint is 8201:4577:3D75:3934:FC25:B83C:8369:72DC:98A2:1368:AA0A:2C18:6C17 7B4:30E8:CD63 Oct 17 09:06:53 rIngo daemon.notice dnscrypt-proxy[774]: Proxying from 127.0.0.1:40 to 208.67.220.220:443

OpenVPN with BTGuard Problems

$
0
0
I'm having trouble routing traffic to BTGuard. The VPN Status says connected, but I can't connect to any external sites, just internal network sites.

Tomato shibby changeip.com DDNS

$
0
0
My changeip.com DDNS settings Register yourself with changeip.com, register your domain and fill the blanks. The router I used is behind a Cable modem so I used the option use WAN, if your router is connected directly to the internet use the second option.

Weird login error

$
0
0
after flashing r7000 to advanced tomato, I loged in and changed the dhcp IP address range. After the reboot I got the correct ip from the new range but couldn't log in. After troubleshooting for a while I tried logging in with a different browser and was able to log in. After setting up up a static ip reservation (differ ent then what was assigned from dhcp) I couldn't log in again. Tried incognito mode was able to log in. any idea what is causing this and how to prevent it? thanks in advance

Linksys E 1000 V2 which firmware do I use???

$
0
0
Ok heres the deal I want to use a open firmware for the router above I came across two different files with no discription of which to use the files listed are tomato-E1000v2-v21-NVRAM32K-1.28.RT-N5x-MIPSR2-123-Mini.bin or tomato-E1000v2-v21-NVRAM32K-1.28.RT-N5x-MIPSR2-123-MiniIPv6.bin the files are from tomato by shibby dont wanna brick my device also wanted to know the differences of the two and if there is any better firmware to use please send me the link if possible. Also is Tomato by Shibby english based firmware? I havent flash a router for years with custom firmware sorry if question is newbish :) Thanks in advance!!!

netgear 3800b

$
0
0
Say please, help me anybody, is there any alternative firmware for netgear 3800b,and can I watch iptv?

VPN Issue

$
0
0
Hi guys. I am hoping someone can help. I recently bought a Netgear WNR3500Lv2 and flashed it with Tomato v1.28. I also signed up for a VPN service through privateinternetaccess, but they have so far been unable to assist me with getting connected. When entering the info, as specified by their website, I click "Save" and I keep getting the error : " Invalid IP address" followed by "Invalid number. Valid range -1-32767". I am not sure if the rest of my router is setup correctly, but I do get internet access through this router, connected to my ADSL router. Any help would be greatly appreciated.

WNR3500L v2 WAN IP

$
0
0
I have brighthouse and i'm unable to get a DHCP IP using the tomato firmware (it was working before i installed tomato). Any suggestions?

Quick Review & Specifications Netgear Dual Band WiFi Range Extender

$
0
0

Maximize the power of your network and make sure you have coverage in every corner of your home with the AC1200 High Power WiFi Range Extender. Get ultimate range and performance you need for iPads®, smartphones, laptops & more!

Product Highlights

  • Extends 802.11ac dual band WiFi up to 1200Mbps
  • 700mW amplified high-power design with 5dBi external antennas for ultimate range
  • Dual core processor for max gigabit WiFi performance
  • Flexible and convenient placement—horizontal or vertical
  • Finds best location for optimal wireless coverage with dynamic LED indicators
  • Easy installation—no CD or Ethernet cable required
  • Provides security through encryption using WPA/WPA2/WEP

Product Benefits

  • Boost WiFi in very large homes and even backyards
  • Eliminate WiFi dead zones in hard to reach areas
  • Improve your mobile WiFi speeds by up to 100% in remote areas
  • FastLane feature uses both WiFi bands to establish one super high-speed connection
  • Connect up to five devices like gaming consoles, smart TVs, and more to your WiFi network at gigabit speeds.
  • Wirelessly share your media files with any device on your network
  • Print documents & photos to any USB printer connected to the extender

Special Features

  • Next Generation WiFi—Create faster dual band WiFi access with 802.11ac technology up to 1200Mbps.
  • Ultimate Range—700 mW high-power amplifiers & high-gain 5dBi antennas for maximum WiFi coverage.
  • Blazing Fast CPU—Powerful dual core ARM A9 processor enables maximum WiFi throughput at Gigabit speed.
  • 5 Gigabit Ethernet Ports—Connect up to 5 wired devices like Blu-ray players, game consoles, smart TVs or streaming players to your WiFi network.
  • Beamforming+—Focuses WiFi signals directly to wireless devices for more reliable connections.
  • FastLane Technology—Use both WiFi bands to establish one super high-speed connection; ideal for HD streaming & gaming.
  • Readyshare USB—Wirelessly share & access USB storage connected to the USB 3.0 port.
  • Wireless Printing—Print documents & photos to any USB printer connected to the WiFi Range Extender. WiFi coverage

Specifications

  • WiFi Technology - 802.11ac
  • WiFi Tech and Range - AC1200 (300 Mbps+900 Mbps)†
  • WiFi Band- Dual Band 2.4 & 5GHz
  • Number of Ethernet Ports - Five (5) 10/100/1000 Ethernet ports with auto-sensing technology
  • Number of USB Ports - One (1) USB 3.0 port
  • Dimensions: 9.92 x 6.85 x 1.22 in (252 x 174 x 31 mm)
  • Weight: 0.67 lb (302 g)

Key Features

  • Extends 2.4 and 5 GHz WiFi signals from existing WiFi routers for better range
  • Powerful 800 MHz dual core processor
  • 700 mW high-power amplifiers
  • 5dBi high-gain antennas
  • Beamforming+ for improved reliability
  • FastLane™ feature provides high-speed WiFi on both wireless bands and is ideal for HD gaming and video streaming
  • Ease of Use - Push ‘N’ Connect using Wi-Fi Protected Setup®(WPS)1
  • Power on/off button

 


How to Flash Firmware on your NETGEAR Router (Broadcom Based) using Linux and a USB-TTL Cable

$
0
0

This tutorial guides users to install firmware into their Broadcom(BRCM) based Netgear router from a linux machine, using USB-TTL cable.

Prerequisites:

  • Target router with serial connection pins on board.
  • One Ethernet cable.
  • An appropriate screwdriver, which is used to open the case of the router.
  • A USB-TTL cable or compatible serial cable.
  • A machine installed with following software,
    - TFTP Client.
    - Serial Client (e.g. Minicom).

Supported Netgear Router Models:-

This tutorial may be referenced for following router models.

Serial Pin Connection:-

Visit appropriate link to get details of the serial pin connection for the target board.

Firmware upgrade procedure: -

STEP 1:

Connect one end of serial cable with the serial pins on the board and another end to your PC.

Configure serial client of your PC. If you are using minicom then this guidewill help you. A sample minicom configuration is given shown in Figure 1.

Figure 1

                                                                                  Figure 1

STEP 2:

Connect your PC to the LAN port of the router with a straight cable and assign a IP address “192.168.1.X” in your PC (assuming the router's default IP is 192.168.1.1).

STEP 3:

Now switch on your router. You must be able to -

  • See router's booting log in minicom.

  • ping 192.168.1.1 (router's default IP) from your PC, as soon as router finishes its booting.

STEP 4:

Now to enter in boot prompt, you have to simultaneously press “Ctrl” and “c” key of your PC and reboot your router. In boot prompt, enter “tftpd” command to go into “TFTP Server mode”.

If tftp server sucessfully started, you will get a message "Reading::" as shown in Figure 2.

                                                                                        Figure 2

STEP 5:

Go into the directory containing the firmware file in your PC. Upload the firmware using following command.

tftp -m binary 192.168.1.1 -c put <Firmware Name>

STEP 6:

After the new firmware is transmitted, the router will start flashing it and reboot the unit automatically.

You will be able to follow the full booting process in your serial communication program. Allow this process to finish, it will take several minutes, and wait until it is COMPLETELY finished.

When it's done, you can try accessing your router's GUI via http://192.168.1.1

How to Set Up a Serial Console for NETGEAR R6200v1

$
0
0

Introduction:

Using serial console setup users can get access to the serial console of their router. Serial console setup finds its most important use in debricking a router. Moreover, developers may use it to extract useful debug information from their routers.

This short tutorial explains how to setup serial console for Netgear R6200v1.

Identify location of Serial pins on your router:

First open the case of your router. You should be able to find pins for serial communications at the location indicated in Figure1(a).

Figure1(a): Serial pin location on your router

Note:- Some  R6200v1 may not come with pins for serial communicationsIn such cases, you will have to attach the pins on your own. Go to the location as indicated in Figure1(a), where you will find a connection with the name JP1 as shown in Figure 1(b). Solder the pins here carefully.

Figure1(b): Serial pin location on your router

Identify important pins on router for serial communication:

Important pins on the router for serial communication are identified in Figure 2.


Figure 2: Important pins on the router for serial communication

Identify important pins in USB-TTL cable:

Important pins in the USB-TTL cable are indicated in Figure 3.

Figure 3: Important pins in USB-TTL cable

How to connect USB-TTL cable to the pins on the router for serial communication:

The connection between USB-TTL cable and pins on the router for serial communication is explained in Figure 4.

Figure 4: Connection between USB-TTL cable and pins for serial communication

Physical setup of your serial console ends here.

Verification of the setup:

To verify your setup, start serial client on your PC with proper parameters and then power on your router. As soon as you do this, you will be able to see debug information from the router on your screen. If you do not see anything, check that all the connections have been made properly and if in doubt, reattach the cables. Verify that the Serial Client has the proper parameters for the connection.



How to Set Up a Serial Console for NETGEAR R6200v2

$
0
0

Introduction:

Using serial console setup users can get access to the serial console of their router. Serial console setup finds its most important use in debricking a router. Moreover, developers may use it to extract useful debug information from their routers.

This short tutorial explains how to setup serial console for Netgear R6200v2.

Identify location of Serial pins on your router:

First open the case of your router. You should be able to find pins for serial communications at the location indicated in Figure1(a).

Figure1(a): Serial pin location on your router

Note:-

Some R6200v2 may not come with pins for serial communications. In such cases, you will have to attach the pins on your own. Go to the location as indicated in Figure1(a), where you will find a connection with the name J252 as shown in Figure 1(b). Solder the pins here carefully.


Figure1(b): Serial pin location on your router

 

Identify important pins on router for serial communication:

Important pins on the router for serial communication are identified in Figure 2.

 

Figure 2: Important pins on the router for serial communication

Identify important pins in USB-TTL cable:

Important pins in the USB-TTL cable are indicated in Figure 3.

Figure 3: Important pins in USB-TTL cable

How to connect USB-TTL cable to the pins on the router for serial communication:

The connection between USB-TTL cable and pins on the router for serial communication is explained in Figure 4.

Figure 4: Connection between USB-TTL cable and pins for serial communication

Physical setup of your serial console ends here.

Verification of the setup:

To verify your setup, start serial client on your PC with proper parameters and then power on your router. As soon as you do this, you will be able to see debug information from the router on your screen. If you do not see anything, check that all the connections have been made properly and if in doubt, reattach the cables. Verify that the Serial Client has the proper parameters for the connection.

How to Properly Adjust the Antennas on the NETGEAR R7000 "Nighthawk" Router

$
0
0

Do you have a R7000 Nighthawk from NETGEAR? Are you super pleased with the superior range and speeds you're getting? Good!

Are you less than pleased with those floppy antennas? I thought so, which is why you have ended up here. The truth is that the antennas aren't really floppy at all -- they're quite sturdy, but there's a "trick" to installing and adjusting them correctly. Here's how.

Step 1: Hold the antenna parallel to the router housing.

Step 2:"Screw" the antenna into the connector as if you were using a screwdriver to drive a screw, by twisting it as shown. Do this until you feel it tighten snugly. Alternately, or if you have small fingers, you could twist the knurled end in; it will move independently from the antennas (which is how they are adjustable)

Step 3: Gently adjust the antennas to the desired angles. If tightened correctly in step 2, they will stay firmly in place.

 

Note that if you move an antenna to the left, the connection may loosen, in which case you can simply hold the antenna in place in the position desired and tighten the knurled end to hold it in place.

Did this procedure work for you? Do you have other suggestions? If so, please leave a comment below.

DD-WRT Update on Heartbleed Vulnerability

$
0
0

Via: DD-WRT

The Heartbleed vulnerability in discovered in OpenSSL 1.0.1 - 1.0.1f is one of the most serious matters in encrypted data communication during the last years. First of all we can ensure you that the encrypted web services like the DD-WRT Online Shop and the Activation center never have been affected because the OpenSSL version we are using does not contain the vulnerability.

Currently the main focus of the Heartbleed discussion lies on web servers using SSL/TLS but other services on Linux systems are also using OpenSSL. By default none of these services is enabled in DD-WRT - nevertheless it is important that you check your router settings to find out if you might be affected by Heartbleed.

The Heartbleed vulnerability allows an attacker to read random 64k blocks of memory of the service using OpenSSL (with TLS). Since every request delivers another 64k memory block an attacker could retrieve sensitive data from the service i.e. private keys. More detailed information about Heartbleed can be found in the security advisory:

http://www.kb.cert.org/vuls/id/720951

and here:

English: http://www.infoq.com/news/2014/04/heartbleed-ssl
German: http://www.golem.de/news/openssl-wichtige-fragen-und-antworten-zu-heartbleed-1404-105740.html

In DD-WRT itself the following services are using OpenSSL with TLS:

  • openvpn
  • squid
  • freeradius
  • asterisk
  • curl
  • pound
  • tor
  • transmission

If you don't use one of these services you are not affected.

    Only builds 19163 thru 23882 are affected.
    All Kong's builds have been updated with latest openssl.

    For R6300V1/WNDR4500: http://www.desipro.de/ddwrt/K3-AC/23885/

    For R6250/R6300V2/R7000: http://www.desipro.de/ddwrt/K3-AC-Arm/r23884/

    For WNR3500L V1: http://www.desipro.de/ddwrt/K26/r21395+/

    Official Response from NETGEAR on Hearbleed for their routers and ReadyNAS

    $
    0
    0

    NETGEAR can confirm no vulnerabilities to the Heartbleed bug have been found in our routers.

    NETGEAR has taken steps to prevent compromise by the Heartbleed bug with our latest Network Attached storage products by releasing new firmware.

    Please update your ReadyNAS products to the latest firmware 6.1.7, which is posted and available for download from the NETGEAR support site.

    Older versions of the NETGEAR ReadyNAS products use an older version of Open SSL and are not affected.

    We recommend the 6.1.7 Firmware Upgrade for the following models:

    RN102/RN103 Series

    RN312/314 Series

    RN516 Series

    RN716 Series

    RN3220 RN4220

    Information and Downloads on the Heartbleed Bug

    $
    0
    0

    The Heartbleed vulnerability allows an attacker to read random 64k blocks of memory of the service using OpenSSL (with TLS). Since every request delivers another 64k memory block an attacker could retrieve sensitive data from the service i.e. private keys. More detailed information about Heartbleed can be found in the security advisory:

    http://www.kb.cert.org/vuls/id/720951 and here http://www.infoq.com/news/2014/04/heartbleed-ssl

    This vulnerability is only if running the following services are using OpenSSL with TLS:

    • openvpn
    • squid
    • freeradius
    • asterisk
    • curl
    • pound
    • tor
    • transmission

    Depending on your setup you may not be affected by Heartbleed.

    In addition, NETGEAR confirms there are no vulnerabilities to the Heartbleed bug in thier routers running factory firmware.

    If you are running and old version of DD-WRT, Tomato or a NETGEAR supplied DD-WRT buid here are the links for new builds that have the Heartbleed fixes

    DD-WRT Releases by Kong

    Tomato Releases

    DD-WRT Releases by NETGEAR


    Viewing all 281 articles
    Browse latest View live


    <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>