Posted: Sun Nov 08, 2020 9:11 Post subject: Firmware: DD-WRT v3.0-r40559 mega (08/06/19) problem [solved
Hello Everyone,
I use a Linksys E1200 v2 and i recently upgraded my firmware to: Firmware: DD-WRT v3.0-r40559 mega (08/06/19)
now i cannot connect to my VPN server. i was told it's either because my router is not supported (it is) or the firmware is not supported (not sure about his).
customer service will not help with firmware issues because they are afraid that it could brick. Can anyone offer a solution or an alternative firmware version that is reliable and stable
thanks,
Mike
Last edited by mriskus on Tue Nov 10, 2020 5:58; edited 1 time in total
2. when you need help, start with details...more details, better chance to get help...
3. very likely, your router to have a very bad performance with VPN, if VPN module is present at all...
with single core CPU @300 Mgz VPN will be like 1-2Mbit max..
https://wiki.dd-wrt.com/wiki/index.php/Linksys_E1200v2 _________________ Atheros
TP-Link WR740Nv1 ---DD-WRT 55630 WAP
TP-Link WR1043NDv2 -DD-WRT 55723 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55779 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55819 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55779 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
Thanks for getting back to me,
i'll give the detailed version. I've used Astrill VPN on my Linksys E1200 v2 router for the last 7 or 8 years. I had the same firmware from 2013 for many of those years, but about two months ago, it would not connect and I upgraded, based on the recommendation of a tech support agent. It was unstable, but generally worked until last night. Now I've tried to upgrade again. When installing the applet, it will fetch the files and take me to my server page, but the status cycles from waiting for network to authenticating to get_config and then to disconnected. The log and response from my vpn company are below
Hi Albert,
ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
This error indicates, either your router is not supported with the Astrill VPN applet or the firmware version is not supported which is flashed on your router.
Best regards,
I also appreciate the link you said, but i've been advised that I must a mega or big build and that minis will not work
I hope this is detailed enough for me to get some help because i've been trying to fix it myself for the last 24 hours and i'm just not tech savvy enough.
Posted: Sun Nov 08, 2020 12:12 Post subject: this is the open vpn log from my last attempt to connect ius
Sun Nov 8 13:09:43 2020 OpenVPN 2.3.2.7 Astrill Edition mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Oct 9 2020
Sun Nov 8 13:09:43 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Nov 8 13:09:43 2020 Control Channel Authentication: tls-auth using INLINE static key file
Sun Nov 8 13:09:43 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 8 13:09:43 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 8 13:09:43 2020 remote port: 3482
Sun Nov 8 13:09:43 2020 Socket Buffers: R=[163840-)131072] S=[163840-)131072]
Sun Nov 8 13:09:43 2020 nice -10 succeeded
Sun Nov 8 13:09:43 2020 UDPv4 link local: [undef]
Sun Nov 8 13:09:43 2020 UDPv4 link remote: [AF_INET]23.227.123.250:3482
Sun Nov 8 13:09:43 2020 Stealth mode initialized
Sun Nov 8 13:09:44 2020 TLS: Initial packet from [AF_INET]23.227.123.250:3482, sid=c63f3517 b58b7455
Sun Nov 8 13:09:47 2020 VERIFY SCRIPT OK: depth=1, C=.., ST=.., L=.., O=.., OU=.., CN=ASCA2, emailAddress=..
Sun Nov 8 13:09:47 2020 VERIFY OK: depth=1, C=.., ST=.., L=.., O=.., OU=.., CN=ASCA2, emailAddress=..
Sun Nov 8 13:09:47 2020 VERIFY OK: nsCertType=SERVER
Sun Nov 8 13:09:49 2020 VERIFY SCRIPT OK: depth=0, CN=SERVER872
Sun Nov 8 13:09:49 2020 VERIFY OK: depth=0, CN=SERVER872
Sun Nov 8 13:10:18 2020 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sun Nov 8 13:10:18 2020 [SERVER872] Peer Connection Initiated with [AF_INET]23.227.123.250:3482
Sun Nov 8 13:10:20 2020 SENT CONTROL [SERVER872]: 'PUSH_REQUEST' (status=1)
Sun Nov 8 13:10:20 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 198.18.40.1,ping 10,ping-restart 90,comp-lzo no,route-gateway 198.18.40.1,topology subnet,echo,sndbuf 262144,rcvbuf 524288,ifconfig 198.18.43.123 255.255.248.0'
Sun Nov 8 13:10:20 2020 OPTIONS IMPORT: timers and/or timeouts modified
Sun Nov 8 13:10:20 2020 OPTIONS IMPORT: LZO parms modified
Sun Nov 8 13:10:20 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sun Nov 8 13:10:20 2020 Socket Buffers: R=[131072-)1048576] S=[131072-)524288]
Sun Nov 8 13:10:20 2020 OPTIONS IMPORT: --ifconfig/up options modified
Sun Nov 8 13:10:20 2020 OPTIONS IMPORT: route options modified
Sun Nov 8 13:10:20 2020 OPTIONS IMPORT: route-related options modified
Sun Nov 8 13:10:20 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Nov 8 13:10:20 2020 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
Sun Nov 8 13:10:20 2020 Exiting due to fatal error