Unbound / DNS over TLS / up-to-date root hints

Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Advanced Networking
Goto page 1, 2  Next
Author Message
tinkeruntilitworks
DD-WRT User


Joined: 21 May 2019
Posts: 208

PostPosted: Wed Jul 03, 2019 0:35    Post subject: Unbound / DNS over TLS / up-to-date root hints Reply with quote
running this on a Netgear R7000P DD-WRT v3.0-r42803 std (03/25/20) settings from Unbound version 1.10.0
*starting with this build unbound and dnsmasq are set-up different. the only thing you need to change is the interface in your unbound.conf
Code:
interface: 0.0.0.0@7053
interface: ::0@7053

when you tick unbound
Code:
server=127.0.0.1#7053
no-resolv

automatically get added to the dnsmasq conf.

i believe changing the port in your unbound.conf to
Code:
port: 7053

also works

you need the Recursive DNS Resolving (Unbound) option

set a NTP Client Server IP this one is from google
216.239.35.0

enable Secure Shell
in the Services tab(GUI)

enable JFFS2 Support
in the Administration tab(GUI)
tick Internal Flash Storage & Clean Internal Flash Storage
click save and then reboot

i used this app to create the directory and files
https://winscp.net/eng/index.php

use scp mode
hostname 192.168.1.1
username root
password your password

create unbound directory
Code:
mkdir /jffs/unbound

download root hints link from unbound settings
Code:
curl -sS --output /jffs/unbound/root.hints https://www.internic.net/domain/named.cache

make copy of root.key file
Code:
cp /etc/unbound/root.key /jffs/unbound

create your unbound.conf file in
/jffs/unbound

make one manually with the lines below

or make copy of the default unbound.conf and manually edit the changes
Code:
cp /etc/unbound/unbound.conf /jffs/unbound


unbound.conf
Code:
server:
verbosity: 1
num-threads: 2
interface: 0.0.0.0@7053
interface: ::0@7053
outgoing-range: 8192
msg-cache-size: 50m
msg-cache-slabs: 2
num-queries-per-thread: 4096
rrset-cache-size: 100m
rrset-cache-slabs: 2
infra-cache-slabs: 2
access-control: 127.0.0.0/8 allow
access-control: 192.168.1.1/24 allow
#if you want to run ipv6
#replace zeros with your ipv6 prefix
#access-control: 0000:0000:0000:0000::/64 allow
chroot: "/jffs/unbound"
username: ""
directory: "/jffs/unbound"
pidfile: "/var/run/unbound.pid"
root-hints: "/jffs/unbound/root.hints"
hide-identity: yes
hide-version: yes
aggressive-nsec: yes
prefetch: yes
prefetch-key: yes
auto-trust-anchor-file: "/jffs/unbound/root.key"
key-cache-slabs: 2
local-data: "localhost A 127.0.0.1"
local-data: "DD-WRT A 192.168.1.1"
tls-upstream: yes
tls-cert-bundle: "/etc/ssl/ca-bundle.crt"
python:
remote-control:
forward-zone:
name: "."
forward-addr: 9.9.9.9@853#dns.quad9.net
forward-addr: 149.112.112.112@853#dns.quad9.net
forward-addr: 1.0.0.1@853#one.one.one.one
forward-addr: 1.1.1.1@853#one.one.one.one
forward-tls-upstream: yes

tick Recursive DNS Resolving (Unbound)
in the Basic Setup tab
and then reboot

end


hosts blocking(not as effective as other methods. some things get overridden some don't.)
just rerun and reboot to update

add this line to your unbound.conf
Code:
include: "/jffs/unbound/override.conf"

run this script in SCP to download the file
Code:
curl -sS -L --compressed "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" > /jffs/override

run this script in SCP to create the blocking conf
Code:
cat /jffs/override | sed 's/[[:space:]]*#.*$//g;' | grep 0.0.0.0 | awk '{print "local-data: \""$2" A 127.0.0.1\""}' > /jffs/unbound/override.conf

reboot

i consulted these sites
https://github.com/NLnetLabs/unbound/blob/master/doc/example.conf.in
https://nlnetlabs.nl/documentation/unbound/unbound.conf/
https://nlnetlabs.nl/documentation/unbound/howto-optimise/
https://calomel.org/unbound_dns.html

*There have been flaws. It's possible there are more.


Last edited by tinkeruntilitworks on Fri Mar 27, 2020 18:18; edited 397 times in total
Sponsor
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 3459
Location: UK, London, just across the river..

PostPosted: Wed Jul 03, 2019 11:15    Post subject: Reply with quote
if your goal is DNS over TLS there is a stubby
via entware, its easy to set up and use, i guess its even faster than unbound...
look at my sig for details...

_________________
Atheros
TP-Link WR740Nv1 ------DD-WRT 42819 BS WAP/Switch
TP-Link WR740Nv4 ------DD-WRT 42557 BS AP,NAT
TP-Link WR1043NDv2 ----DD-WRT 42287 BS AP,NAT,AD Block,AP Isolation,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----DD-WRT 42819 BS AP,NAT,AD Block,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----Gargoyle OS 1.12.0 AP,NAT,QoS,Quotas
Qualcomm/IPQ8065
Netgear R7800 -------DD-WRT 42819 BS AP,NAT,AD-Block,AP&Net Isolation,VLAN's,Firewall,Local DNS,DoT
Broadcom
Netgear R7000 -------DD-WRT 42819 BS AP,Wi-Fi OFF,NAT,AD-Block,Firewall,Local DNS,Forced DNS,DoT,VPN
------------------------------------------------------------------------------------------------
Stubby for DNS over TLS I DNSCrypt v2 via Entware by mac913
tinkeruntilitworks
DD-WRT User


Joined: 21 May 2019
Posts: 208

PostPosted: Tue Jul 09, 2019 13:00    Post subject: Reply with quote
you can add static leases in Additional Dnsmasq Options
Code:
dhcp-host=00:FF:FF:00:xx:x1,deviceone,192.168.1.50,infinite
dhcp-host=00:FF:FF:00:xx:x1,devicetwo,192.168.1.51,infinite
dhcp-host=00:FF:FF:00:xx:x1,devicethree,192.168.1.52,infinite
dhcp-host=00:FF:FF:00:xx:x1,devicefour,192.168.1.53,infinite
dhcp-host=00:FF:FF:00:xx:x1,devicefive,192.168.1.54,infinite
dhcp-host=00:FF:FF:00:xx:x1,devicesix,192.168.1.55,infinite
dhcp-host=00:FF:FF:00:xx:x1,deviceseven,192.168.1.56,infinite
dhcp-host=00:FF:FF:00:xx:x1,deviceeight,192.168.1.57,infinite

and then add them to your unbound.conf
Code:
include: "/jffs/unbound/override.conf"
server:
verbosity: 1
num-threads: 2
interface: 0.0.0.0
interface: ::0
port: 7053
outgoing-range: 8192
outgoing-num-tcp: 1000
incoming-num-tcp: 1000
stream-wait-size: 50m
msg-cache-size: 50m
msg-cache-slabs: 2
num-queries-per-thread: 4096
rrset-cache-size: 100m
rrset-cache-slabs: 2
infra-cache-slabs: 2
access-control: 127.0.0.0/8 allow
access-control: 192.168.1.1/24 allow
#if you want to run ipv6
#replace zeros with your ipv6 prefix
#access-control: 0000:0000:0000:0000::/64 allow
chroot: "/jffs/unbound"
username: ""
directory: "/jffs/unbound"
pidfile: "/var/run/unbound.pid"
root-hints: "/jffs/unbound/named.cache"
hide-identity: yes
hide-version: yes
aggressive-nsec: yes
prefetch: yes
prefetch-key: yes
auto-trust-anchor-file: "/jffs/unbound/root.key"
key-cache-size: 8m
key-cache-slabs: 2
local-data: "localhost A 127.0.0.1"
local-data: "DD-WRT A 192.168.1.1"
local-data: "deviceone A 192.168.1.50"
local-data: "devicetwo A 192.168.1.51"
local-data: "devicethree A 192.168.1.52"
local-data: "devicefour A 192.168.1.53"
local-data: "devicefive A 192.168.1.54"
local-data: "devicesix A 192.168.1.55"
local-data: "deviceseven A 192.168.1.56"
local-data: "deviceeight A 192.168.1.57"
tls-upstream: yes
tls-cert-bundle: "/etc/ssl/ca-bundle.crt"
python:
remote-control:
forward-zone:
name: "."
forward-addr: 9.9.9.9@853#dns.quad9.net
forward-addr: 149.112.112.112@853#dns.quad9.net
forward-addr: 1.0.0.1@853#one.one.one.one
forward-addr: 1.1.1.1@853#one.one.one.one
forward-tls-upstream: yes


Last edited by tinkeruntilitworks on Fri Mar 27, 2020 17:07; edited 63 times in total
SurprisedItWorks
DD-WRT Guru


Joined: 04 Aug 2018
Posts: 684
Location: Appalachian mountains, USA

PostPosted: Thu Jul 11, 2019 19:49    Post subject: Reply with quote
Haven't experimented with DNS over TLS myself, but I did notice when this guide https://forum.dd-wrt.com/phpBB2/viewtopic.php?p=1166512#1166512 appeared recently. It looks like a clean presentation of what's required.
_________________
Six Linksys WRT1900ACSv2 (39144/40009/41954):
VLANs, multiple VAPs, NAS, QoS, client-mode travel router, OpenVPN client/PBR (AirVPN), two DNSCrypt servers (incl Quad9) routed through vpn.
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 3459
Location: UK, London, just across the river..

PostPosted: Fri Jul 12, 2019 16:11    Post subject: Reply with quote
SurprisedItWorks wrote:
Haven't experimented widnth DNS over TLS myself, but I did notice when this guide https://forum.dd-wrt.com/phpBB2/viewtopic.php?p=1166512#1166512 appeared recently. It looks like a clean presentation of what's required.


if you check the link in my sig stubby is easy to configure and does not require jffs and its working well...

as i see your sig may i ask how to use quad9 for DNScrypt
i use start up script...with the standard resolvers...
i've seen some guide lines how to use quad9 but had no success
can you shred some light...

_________________
Atheros
TP-Link WR740Nv1 ------DD-WRT 42819 BS WAP/Switch
TP-Link WR740Nv4 ------DD-WRT 42557 BS AP,NAT
TP-Link WR1043NDv2 ----DD-WRT 42287 BS AP,NAT,AD Block,AP Isolation,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----DD-WRT 42819 BS AP,NAT,AD Block,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----Gargoyle OS 1.12.0 AP,NAT,QoS,Quotas
Qualcomm/IPQ8065
Netgear R7800 -------DD-WRT 42819 BS AP,NAT,AD-Block,AP&Net Isolation,VLAN's,Firewall,Local DNS,DoT
Broadcom
Netgear R7000 -------DD-WRT 42819 BS AP,Wi-Fi OFF,NAT,AD-Block,Firewall,Local DNS,Forced DNS,DoT,VPN
------------------------------------------------------------------------------------------------
Stubby for DNS over TLS I DNSCrypt v2 via Entware by mac913


Last edited by Alozaros on Sat Jul 13, 2019 6:15; edited 1 time in total
SurprisedItWorks
DD-WRT Guru


Joined: 04 Aug 2018
Posts: 684
Location: Appalachian mountains, USA

PostPosted: Fri Jul 12, 2019 20:55    Post subject: Reply with quote
Alozaros wrote:

as i see your sig may i ask how to use quad9 for DNScrypt
i use start up script...with the standart resovers...
ive seen some guide lines how to use quad9 but had no success
can you shred some light...


The link in my sig is to the Marvell new-build thread for 39144, where I posted a detailed procedure in response to someone's question. I should have started a new thread, of course. I officially feel guilty.

For what it's worth, I've been using DNSCrypt with Quad9 here for four months or so. No problems at all. I'm using it on 39144, which still had the Encrypt DNS button in the DNSMasq section. I suspect you could use the same procedure without difficulty on newer releases that lack that button, which I don't use anyway, as reports are that dnscrypt-proxy is still included in those newer builds.

Update (Aug 7, 2019): I'm using the exact same DNSCrypt setup now on release 40009, which indeed has no Encrypt DNS button. No changes were required.

_________________
Six Linksys WRT1900ACSv2 (39144/40009/41954):
VLANs, multiple VAPs, NAS, QoS, client-mode travel router, OpenVPN client/PBR (AirVPN), two DNSCrypt servers (incl Quad9) routed through vpn.


Last edited by SurprisedItWorks on Wed Aug 07, 2019 16:53; edited 1 time in total
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 3459
Location: UK, London, just across the river..

PostPosted: Sat Jul 13, 2019 6:14    Post subject: Reply with quote
yep in the past tried the same 9.9.9.9 over start up script but with no avail ...
currently using DNScrypt via start up & DNSmasq
all working as it should...but will try again this quad9 stuff..later

so far DoT is working on all my other routers, i haven't tried yet on R7800 as i have DNScrypt on it...
Generally speaking, i also use FFx DoH option with
9.9.9.9 and its working on app level very well ...

_________________
Atheros
TP-Link WR740Nv1 ------DD-WRT 42819 BS WAP/Switch
TP-Link WR740Nv4 ------DD-WRT 42557 BS AP,NAT
TP-Link WR1043NDv2 ----DD-WRT 42287 BS AP,NAT,AD Block,AP Isolation,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----DD-WRT 42819 BS AP,NAT,AD Block,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----Gargoyle OS 1.12.0 AP,NAT,QoS,Quotas
Qualcomm/IPQ8065
Netgear R7800 -------DD-WRT 42819 BS AP,NAT,AD-Block,AP&Net Isolation,VLAN's,Firewall,Local DNS,DoT
Broadcom
Netgear R7000 -------DD-WRT 42819 BS AP,Wi-Fi OFF,NAT,AD-Block,Firewall,Local DNS,Forced DNS,DoT,VPN
------------------------------------------------------------------------------------------------
Stubby for DNS over TLS I DNSCrypt v2 via Entware by mac913
PavelVD
DD-WRT Novice


Joined: 26 Jul 2019
Posts: 35

PostPosted: Thu Sep 05, 2019 20:26    Post subject: Re: Unbound / DNS over TLS / up-to-date root hints / ad-bloc Reply with quote
I want to tell you what I'm doing wrong?
I took this design
tinkeruntilitworks wrote:
...
ad-blocking- run these scripts
curl -sS -L --compressed "https://raw.githubusercontent.com/StevenBlack/hosts/master/alternates/social/hosts" > /jffs/adservers.conf

cat /jffs/adservers.conf | grep '^0\.0\.0\.0' | awk '{print "local-zone: \""$2"\" redirect\nlocal-data: \""$2" A 0.0.0.0\""}' > /jffs/unbound/adservers.conf

...

then create your unbound.conf file and place it in /jffs/unbound and add include: /jffs/unbound/adservers.conf for ad-blocking ...

But it seems to me this does not work. To check, I take, for example, the site - "interactivearea.ru" - it is present in the file
Code:
local-zone: "interactivearea.ru" redirect
local-data: "interactivearea.ru A 0.0.0.0"

But the browser still displays the site. At the same time ip6 and "forward-zone:" are not included.
In your example, the line 'include: /jffs/unbound/adservers.conf' does not contain quotation marks ("") for the file path - Is this not an error? However, I tried both options - the result is the same. Therefore, I have no confidence that the lock works.
tinkeruntilitworks
DD-WRT User


Joined: 21 May 2019
Posts: 208

PostPosted: Thu Sep 05, 2019 21:11    Post subject: Reply with quote
*
blocking has changed. plus i put disclaimer it's not the best.


Last edited by tinkeruntilitworks on Sun Mar 15, 2020 0:46; edited 6 times in total
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 3459
Location: UK, London, just across the river..

PostPosted: Thu Sep 05, 2019 23:42    Post subject: Re: Unbound / DNS over TLS / up-to-date root hints / ad-bloc Reply with quote
PavelVD wrote:
I want to tell you what I'm doing wrong?
I took this design
tinkeruntilitworks wrote:
...
ad-blocking- run these scripts
curl -sS -L --compressed "https://raw.githubusercontent.com/StevenBlack/hosts/master/alternates/social/hosts" > /jffs/adservers.conf

cat /jffs/adservers.conf | grep '^0\.0\.0\.0' | awk '{print "local-zone: \""$2"\" redirect\nlocal-data: \""$2" A 0.0.0.0\""}' > /jffs/unbound/adservers.conf

...

then create your unbound.conf file and place it in /jffs/unbound and add include: /jffs/unbound/adservers.conf for ad-blocking ...

But it seems to me this does not work. To check, I take, for example, the site - "interactivearea.ru" - it is present in the file
Code:
local-zone: "interactivearea.ru" redirect
local-data: "interactivearea.ru A 0.0.0.0"

But the browser still displays the site. At the same time ip6 and "forward-zone:" are not included.
In your example, the line 'include: /jffs/unbound/adservers.conf' does not contain quotation marks ("") for the file path - Is this not an error? However, I tried both options - the result is the same. Therefore, I have no confidence that the lock works.


when you have a question, that's why its so important to start with router model and
current build running.....

as this happens check syslog for err's, look at the download location to confirms file is downloaded
and its there...

very likely your router doesn't have a curl command...
you can try with wget, but than you need to change the source to http instead of https

_________________
Atheros
TP-Link WR740Nv1 ------DD-WRT 42819 BS WAP/Switch
TP-Link WR740Nv4 ------DD-WRT 42557 BS AP,NAT
TP-Link WR1043NDv2 ----DD-WRT 42287 BS AP,NAT,AD Block,AP Isolation,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----DD-WRT 42819 BS AP,NAT,AD Block,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----Gargoyle OS 1.12.0 AP,NAT,QoS,Quotas
Qualcomm/IPQ8065
Netgear R7800 -------DD-WRT 42819 BS AP,NAT,AD-Block,AP&Net Isolation,VLAN's,Firewall,Local DNS,DoT
Broadcom
Netgear R7000 -------DD-WRT 42819 BS AP,Wi-Fi OFF,NAT,AD-Block,Firewall,Local DNS,Forced DNS,DoT,VPN
------------------------------------------------------------------------------------------------
Stubby for DNS over TLS I DNSCrypt v2 via Entware by mac913
tinkeruntilitworks
DD-WRT User


Joined: 21 May 2019
Posts: 208

PostPosted: Thu Sep 05, 2019 23:52    Post subject: Reply with quote
deleted

Last edited by tinkeruntilitworks on Sun Oct 27, 2019 19:25; edited 3 times in total
PavelVD
DD-WRT Novice


Joined: 26 Jul 2019
Posts: 35

PostPosted: Fri Sep 06, 2019 11:21    Post subject: Reply with quote
SurprisedItWorks wrote:
Alozaros wrote:
...
as i see your sig may i ask how to use quad9 for DNScrypt
i use start up script...with the standart resovers...
ive seen some guide lines how to use quad9 but had no success
can you shred some light...


The link in my sig is to the Marvell new-build thread for 39144, where I posted a detailed procedure in response to someone's question. I should have started a new thread, of course. I officially feel guilty.

Linksys WRT1900ACSv2 -- DD-WRT v3.0-r40890 std (09/03/19)
I tested for your "sig" a bunch of Unbound (enabled through "Recursive DNS Resolving") and NDSCrypt. I don't know why (I'm not very smart), but they did not work together on port 127.0.0.1#30. But they work well with this setup:
In "Administration--Commands--Startup" introduced:
Code:
dnscrypt-proxy -d -S -a 192.168.1.1:30 \
-r 9.9.9.9:8443 -N 2.dnscrypt-cert.quad9.net -k \
67c8:47b8:c875:8cd1:2024:5543:be75:6746:df34:df1d:84c0:0b8c:4703:68df:821d:863e
In the file "unbound.conf" added:
Code:
forward-zone:
name: "."
forward-addr: 192.168.1.1@30
I do not like that with this combination, DNS leaks anyway.
(In general, it is not clear: Why bind Unbound with DNSCrypt or TLS - does Unbound not hide DNS queries?)
"Adguard-dns" works in a similar way:
Startup:
dnscrypt-proxy -d -S -a 192.168.1.1:31 \
-R adguard-dns -L /etc/dnscrypt/dnscrypt-resolvers.csv

& unbound.conf:
forward-zone:
name: "."
forward-addr: 192.168.1.1@31


tinkeruntilitworks wrote:
did you build the new directory?
or did you just add the ad-blocking?

very likely your router doesn't have a curl command...
you can try with wget, but than you need to change the source to http instead of https
Yes, I have everything as in your pictures. "curl" works, otherwise I would not be able to get "adservers.conf" and experiment.
As for the "pixelserv_tls" - I did not know about it. Thanks, maybe someday I'll try.
I know one more lock option: take a look.
This has its own peculiarity: you need Unbound to work on another port - it does not replace DNSMasq when it is turned on. This method has been proposed here.
I like this option the most and I use it now, but I’m checking other possibilities as well.
This is better for me because I can get into the ".lib" zone by adding the line "server=/lib/coin/emc/bazar/5.132.191.104" to the "Additional Dnsmasq Options". Unbound and DNSCrypt do not provide names from this zone. In addition, my provider has local resources that can only be resolved by the provider's DNS server. The "No DNS Rebind" option for DNSMasq prohibits this, but Unbound cannot. The line "address=/forum.net.z/video.net.z/lib.net.z/11.12.13.14" (changed) helps out.
Sorry, I think I left the main topic. Embarassed
tinkeruntilitworks
DD-WRT User


Joined: 21 May 2019
Posts: 208

PostPosted: Fri Sep 20, 2019 15:58    Post subject: Reply with quote
deleted

Last edited by tinkeruntilitworks on Sun Oct 27, 2019 19:26; edited 8 times in total
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 3459
Location: UK, London, just across the river..

PostPosted: Sat Sep 21, 2019 9:11    Post subject: Reply with quote
so PavelVD to my knowledge and understanding..
you run DNSCrypt via Unbound on the same port...
and it doesn't seems wright...well usually, DoT uses port 853 external and any internal you set for your loop back interface...

well i don't see any need for both of them apart of the options and settings that unbound does provide...
same set of futures and settings even more..you might have with DNScrypt v2,
and no need of unbound to run it...it still does recursive resolving as Stubby does too...if this is your goal...
Than the most interesting thing for me is, which of all above Stubby, DNScrypt, and Unbound drains less resources and provides the best and more stable/fast results...?? (all they do recursive resolving)
so far, im happy with DNSCrypt and Stubby on my units..

_________________
Atheros
TP-Link WR740Nv1 ------DD-WRT 42819 BS WAP/Switch
TP-Link WR740Nv4 ------DD-WRT 42557 BS AP,NAT
TP-Link WR1043NDv2 ----DD-WRT 42287 BS AP,NAT,AD Block,AP Isolation,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----DD-WRT 42819 BS AP,NAT,AD Block,Firewall,Local DNS,Forced DNS,DoT,VPN
TP-Link WR1043NDv2 ----Gargoyle OS 1.12.0 AP,NAT,QoS,Quotas
Qualcomm/IPQ8065
Netgear R7800 -------DD-WRT 42819 BS AP,NAT,AD-Block,AP&Net Isolation,VLAN's,Firewall,Local DNS,DoT
Broadcom
Netgear R7000 -------DD-WRT 42819 BS AP,Wi-Fi OFF,NAT,AD-Block,Firewall,Local DNS,Forced DNS,DoT,VPN
------------------------------------------------------------------------------------------------
Stubby for DNS over TLS I DNSCrypt v2 via Entware by mac913
tinkeruntilitworks
DD-WRT User


Joined: 21 May 2019
Posts: 208

PostPosted: Tue Sep 24, 2019 14:52    Post subject: Reply with quote
deleted

Last edited by tinkeruntilitworks on Sun Oct 27, 2019 19:26; edited 3 times in total
Goto page 1, 2  Next Display posts from previous:    Page 1 of 2
Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum