Unbound DNS over TLS Adblock up-to-date root.hints

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Goto page Previous  1, 2, 3, 4, 5
Author Message
mwchang
DD-WRT Guru


Joined: 26 Mar 2013
Posts: 1855
Location: Hung Hom, Hong Kong

PostPosted: Fri Nov 04, 2022 20:12    Post subject: Re: Unbound DNS over TLS Adblock up-to-date root.hints Reply with quote
tinkeruntilitworks wrote:

Adblock with Unbound

01. Copy and paste all these commands at the same time in Xshell 6 or PuTTY and press Enter (IMPORTANT):
(Take a few minutes to complete)
Code:
curl -sS -L --compressed "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" > /tmp/blockedhosts
cat /tmp/blockedhosts | grep 0.0.0.0 | awk '{print "local-data: \""$2" A 127.0.0.1\""}' > /jffs/etc/blockedhosts.conf
rm -r /tmp/blockedhosts
stopservice unbound
startservice unbound
ps | grep unbound

I come across a better method to create the /tmp/blockedhosts. Instead of:
Code:

local-data: "domain.to.block A 127.0.0.1"

Use:
Code:

local-zone: "domain.to.block" static

or
Code:

local-zone: "domain.to.block" refuse

For using "refuse", the corresponding command in line 2 of the script should be:
Code:

cat /tmp/blockedhosts | grep 0.0.0.0 | awk '{print "local-zone: \""$2"\" refuse"}' > /jffs/etc/blockedhosts.conf

And in /jffs/etc/unbound.conf, you need to use the "server:" before include:
Code:

# Adblock
server:
include: "/jffs/etc/blockedhosts.conf"

It should make Unbound respond faster and use less memory.

BTW, when testing everything related to DNS in Windows, the following command should be useful:
Code:
ipconfig /flushdns




References:

Unbound memory optimization : dns
https://www.reddit.com/r/dns/comments/w0g83i/unbound_memory_optimization/

Unbound: Memory consumption very high, gets killed | The FreeBSD Forums
https://forums.freebsd.org/threads/unbound-memory-consumption-very-high-gets-killed.78578/

FreshPorts -- dns/void-zones-tools: Prepare a list of void zones that can be readily fed into Unbound
https://www.freshports.org/dns/void-zones-tools

unbound-checkconf memory usage is higher than naively expected · Issue #128 · NLnetLabs/unbound · GitHub
https://github.com/NLnetLabs/unbound/issues/128

subject:"reply for reserved TLD's"
https://www.mail-archive.com/search?l=unbound-users@lists.nlnetlabs.nl&q=subject:%22reply+for+reserved+TLD%27s%22&o=newest&f=1

_________________
Router: Asus RT-N18U (rev. A1)

Drink, Blink, Stretch! Live long and prosper! May the Force and farces be with you!

Facebook: https://www.facebook.com/changmanwai
Website: https://sites.google.com/site/changmw
SETI@Home profile: http://setiathome.berkeley.edu/view_profile.php?userid=211832
GitHub: https://github.com/changmw/changmw


Last edited by mwchang on Tue Nov 08, 2022 3:58; edited 4 times in total
Sponsor
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 14126
Location: Texas, USA

PostPosted: Fri Nov 04, 2022 20:39    Post subject: Reply with quote
This should probably be rm -f, not rm -r:
Code:
rm -r /tmp/blockedhosts

The -r is recursive, the -f is ignore nonexistent files and arguments, never prompt, which is what I think was intended, not recursively removing a file.

_________________
"Life is but a fleeting moment, a vapor that vanishes quickly; All is vanity"
Contribute To DD-WRT
Pogo - A minimal level of ability is expected and needed...
DD-WRT Releases 2023 (PolitePol)
DD-WRT Releases 2023 (RSS Everything)

----------------------
Linux User #377467 counter.li.org / linuxcounter.net
mwchang
DD-WRT Guru


Joined: 26 Mar 2013
Posts: 1855
Location: Hung Hom, Hong Kong

PostPosted: Sat Nov 05, 2022 0:56    Post subject: Reply with quote
kernel-panic69 wrote:
This should probably be rm -f, not rm -r:
Code:
rm -r /tmp/blockedhosts

The -r is recursive, the -f is ignore nonexistent files and arguments, never prompt, which is what I think was intended, not recursively removing a file.

WARNING: DO NOT TRY IT

The horrifying consequence of "rm -r / tmp/blockedhosts"... all you need is just an extra space! Smile

BTW, I cannot find posts written by user "tinkeruntilitworks" using Search, not even this thread's first message. Because he/she is just a Guest?

_________________
Router: Asus RT-N18U (rev. A1)

Drink, Blink, Stretch! Live long and prosper! May the Force and farces be with you!

Facebook: https://www.facebook.com/changmanwai
Website: https://sites.google.com/site/changmw
SETI@Home profile: http://setiathome.berkeley.edu/view_profile.php?userid=211832
GitHub: https://github.com/changmw/changmw
blkt
DD-WRT Guru


Joined: 20 Jan 2019
Posts: 5660

PostPosted: Sat Nov 05, 2022 1:08    Post subject: Reply with quote
This is what happens when a user requests account deletion.
dale_gribble39
DD-WRT Guru


Joined: 11 Jun 2022
Posts: 1899

PostPosted: Sat Nov 05, 2022 2:20    Post subject: Reply with quote
I assume you're referring to this thread regarding said request:

https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=325791&start=15

I think that was a lot of hot-headed nonsense from the looks of all the posts edited to say, "deleted"... but the person re-birthed themselves as "itwontbewe", as we all should know if we're paying that much attention.

_________________
"The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep." - Robert Frost

"I am one of the noticeable ones - notice me" - Dale Frances McKenzie Bozzio

<fact>code knows no gender</fact>

This is me, knowing I've ruffled your feathers, and not giving a ****
Some people are still hard-headed.

--------------------------------------
Mac Pro (Mid 2012) - Two 2.4GHz 6-Core Intel Xeon E5645 processors 64GB 1333MHz DDR3 ECC SDRAM OpenSUSE Leap 15.5
l3g023
DD-WRT Novice


Joined: 27 Sep 2020
Posts: 13

PostPosted: Sun Apr 02, 2023 18:35    Post subject: Re: Unbound DNS over TLS Adblock up-to-date root.hints Reply with quote
mwchang wrote:
tinkeruntilitworks wrote:

Adblock with Unbound

01. Copy and paste all these commands at the same time in Xshell 6 or PuTTY and press Enter (IMPORTANT):
(Take a few minutes to complete)
Code:
curl -sS -L --compressed "https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts" > /tmp/blockedhosts
cat /tmp/blockedhosts | grep 0.0.0.0 | awk '{print "local-data: \""$2" A 127.0.0.1\""}' > /jffs/etc/blockedhosts.conf
rm -r /tmp/blockedhosts
stopservice unbound
startservice unbound
ps | grep unbound

I come across a better method to create the /tmp/blockedhosts. Instead of:
Code:

local-data: "domain.to.block A 127.0.0.1"

Use:
Code:

local-zone: "domain.to.block" static

or
Code:

local-zone: "domain.to.block" refuse

For using "refuse", the corresponding command in line 2 of the script should be:
Code:

cat /tmp/blockedhosts | grep 0.0.0.0 | awk '{print "local-zone: \""$2"\" refuse"}' > /jffs/etc/blockedhosts.conf

And in /jffs/etc/unbound.conf, you need to use the "server:" before include:
Code:

# Adblock
server:
include: "/jffs/etc/blockedhosts.conf"

It should make Unbound respond faster and use less memory.

BTW, when testing everything related to DNS in Windows, the following command should be useful:
Code:
ipconfig /flushdns




References:

Unbound memory optimization : dns
https://www.reddit.com/r/dns/comments/w0g83i/unbound_memory_optimization/

Unbound: Memory consumption very high, gets killed | The FreeBSD Forums
https://forums.freebsd.org/threads/unbound-memory-consumption-very-high-gets-killed.78578/

FreshPorts -- dns/void-zones-tools: Prepare a list of void zones that can be readily fed into Unbound
https://www.freshports.org/dns/void-zones-tools

unbound-checkconf memory usage is higher than naively expected · Issue #128 · NLnetLabs/unbound · GitHub
https://github.com/NLnetLabs/unbound/issues/128

subject:"reply for reserved TLD's"
https://www.mail-archive.com/search?l=unbound-users@lists.nlnetlabs.nl&q=subject:%22reply+for+reserved+TLD%27s%22&o=newest&f=1



Sorry but not very good with Forums. It might be just me but I feel your post(s) are quite confusing. You are quoting Adblock with Unbound with a better method to create /tmp/blockedhosts. Then there's a reply from kernel-panic69:

kernel-panic69 wrote:
This should probably be rm -f, not rm -r:
Code:
rm -r /tmp/blockedhosts

The -r is recursive, the -f is ignore nonexistent files and arguments, never prompt, which is what I think was intended, not recursively removing a file.



Could you please explain clearly?

Maybe post the full code (correct). Also why would we use 2 different variations (static or refuse), what's the difference?

Thanks

l3g0
mwchang
DD-WRT Guru


Joined: 26 Mar 2013
Posts: 1855
Location: Hung Hom, Hong Kong

PostPosted: Mon Apr 03, 2023 11:54    Post subject: Re: Unbound DNS over TLS Adblock up-to-date root.hints Reply with quote
l3g023 wrote:
Sorry but not very good with Forums. It might be just me but I feel your post(s) are quite confusing. You are quoting Adblock with Unbound with a better method to create /tmp/blockedhosts. Then there's a reply from kernel-panic69:

kernel-panic69 wrote:
This should probably be rm -f, not rm -r:
Code:
rm -r /tmp/blockedhosts

The -r is recursive, the -f is ignore nonexistent files and arguments, never prompt, which is what I think was intended, not recursively removing a file.


Could you please explain clearly?

Maybe post the full code (correct). Also why would we use 2 different variations (static or refuse), what's the difference?

Do you have a working Unbound? Post your unbound.conf.

You don't have to implement ad-blocking filters. These days, ads are better blocked by browser extensions like Ublock Origin.

_________________
Router: Asus RT-N18U (rev. A1)

Drink, Blink, Stretch! Live long and prosper! May the Force and farces be with you!

Facebook: https://www.facebook.com/changmanwai
Website: https://sites.google.com/site/changmw
SETI@Home profile: http://setiathome.berkeley.edu/view_profile.php?userid=211832
GitHub: https://github.com/changmw/changmw
itwontbewe
DD-WRT User


Joined: 29 Sep 2020
Posts: 260
Location: United States

PostPosted: Thu Apr 06, 2023 18:52    Post subject: Reply with quote
the rm -r is for removing a directory. i was just removing a file so the rm by itself is all that is needed.

scroll this link down to the local-zone: <zone> <type> section for a list of options and what they do
https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html

i now use always_null but you can switch out any you want to try
Code:
curl --output /tmp/override https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
grep '^0\.0\.0\.0' /tmp/override | sed '1d' | awk '{print "local-zone: \""$2"\" always_null"}' > /tmp/etc/unbound/overriden.conf
rm /tmp/override
unbound-control reload


you will have to adjust the directory depending on how you have it setup

an example setup

do not tick unbound in the ui

Dnsmasq
Additional Options
Code:
server=127.0.0.1#7053
no-resolv

Startup script
Code:
mkdir -p /tmp/etc
cp -r /etc/unbound /tmp/etc
> /tmp/etc/unbound/overriden.conf
> /tmp/unbound.conf
cat << EOF > /tmp/unbound.conf
server:
verbosity: 1
interface: 0.0.0.0@7053
outgoing-num-tcp: 10
incoming-num-tcp: 10
msg-buffer-size: 8192
msg-cache-size: 1m
num-queries-per-thread: 30
rrset-cache-size: 2m
infra-cache-numhosts: 200
chroot: ""
username: ""
directory: "/tmp/etc/unbound"
pidfile: "/var/run/unbound.pid"
root-hints: "/tmp/etc/unbound/named.cache"
target-fetch-policy: "2 1 0 0 0 0"
harden-short-bufsize: yes
harden-large-queries: yes
auto-trust-anchor-file: "/tmp/etc/unbound/root.key"
key-cache-size: 100k
neg-cache-size: 10k
num-threads: 2
so-reuseport: no
msg-cache-slabs: 2
rrset-cache-slabs: 2
infra-cache-slabs: 2
key-cache-slabs: 2
outgoing-range: 462
access-control: 127.0.0.0/8 allow
access-control: 192.168.1.1/24 allow
local-data: "localhost A 127.0.0.1"
local-data: "DD-WRT A 192.168.1.1"
include: "/tmp/etc/unbound/overriden.conf"
tls-cert-bundle: "/etc/ssl/ca-bundle.crt"
python:
remote-control:
control-enable: yes
control-use-cert: no
forward-zone:
name: "."
forward-addr: 9.9.9.9@853#dns.quad9.net
forward-tls-upstream: yes
EOF
unbound -c /tmp/unbound.conf
curl --output /tmp/etc/unbound/named.cache https://www.internic.net/domain/named.cache
curl --output /tmp/override https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
grep '^0\.0\.0\.0' /tmp/override | sed '1d' | awk '{print "local-zone: \""$2"\" always_null"}' > /tmp/etc/unbound/overriden.conf
rm /tmp/override
unbound-control reload


* April 10 2023
mwchang
DD-WRT Guru


Joined: 26 Mar 2013
Posts: 1855
Location: Hung Hom, Hong Kong

PostPosted: Mon May 22, 2023 13:48    Post subject: Reply with quote
This is a long script (with comments and biblography) for downloading DNS block lists from multiple sources, to create blockedhosts.conf (variable: target). Just include it in your unbound.conf.

Un-comment the list (removing "#") to enable a list (dl is the function to download it), and comment them back to disable it.

Not sure whether this should be split into a new thread.

BTW, I have 2 simple scripts that generate the SSL certificates (Ed25519) for Unbound. To be posted as new topic later....
Code:
#!/bin/sh
#
# DD-WRT :: View topic - Unbound DNS over TLS Adblock up-to-date root.hints
# https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320362&sid=8f74203692da063796392a961494cde5
#
function dl()  {
  echo -e "Downloading $2 to $1..."
  curl -L --compressed $2 >> $1
}

function pp2() {
  echo "Processing $2 into $3..."
  #
  # Unbound memory optimization : dns
  # https://www.reddit.com/r/dns/comments/w0g83i/unbound_memory_optimization/
  #
  # Unbound: Memory consumption very high, gets killed | The FreeBSD Forums
  # https://forums.freebsd.org/threads/unbound-memory-consumption-very-high-gets-killed.78578/
  #
  # unbound-checkconf memory usage is higher than naively expected · Issue #128 · NLnetLabs/unbound · GitHub
  # https://github.com/NLnetLabs/unbound/issues/128
  #
  if [ $1 == 127 ] ; then
    echo '.. Method: local-data'
    cat $2 | awk '{print "local-data: \""$2".\" A 127.0.0.1"}' >> $3
  else
    echo '.. Method: local-zone'
    cat $2 | grep 0.0.0.0 | awk '{print "local-zone: \""$2".\" refuse"}' >> $3
  fi
}

function pp1() {
  echo "Processing $2 into $3 ..."
  if [ $1 == 127 ] ; then
    echo '.. Method: local-data'
    cat $2 | awk '{print "local-data: \""$1".\" A 127.0.0.1"}' >> $3
  else
    echo '.. Method: local-zone'
    cat $2 | awk '{print "local-zone: \""$1".\" refuse"}' >> $3
  fi
}

target=/jffs/etc/unbound/blockedhosts.conf

if [ -f $target ] ; then
  echo -e "$0[$$]: \033[1m$target\033[0m already exists!\007"
  exit 1
fi

tf=/tmp/tmp
tf2=/tmp/tmp2

echo -e "Creating \033[1m$tf\033[0m ..."
cat /dev/null > $tf

if true ; then
  echo -e '\033[1mPhase 1\033[0m'

  # dl $tf 'https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts'
  # dl $tf 'https://raw.githubusercontent.com/AdAway/adaway.github.io/master/hosts.txt'
  # dl $tf 'https://github.com/chadmayfield/my-pihole-blocklists/raw/master/lists/pi_blocklist_porn_all.list'
  dl $tf 'https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt'
else
  echo e '\033[1mPhase 1b\033[0m'
  # the following list will consume all memory
  dl $tf 'https://www.github.developerdan.com/hosts/lists/ads-and-tracking-extended.txt'
fi

#
# https://pgl.yoyo.org/adservers/serverlist.php?hostformat=unbound;showintro=0
#
# https://someonewhocares.org/hosts/
# https://pgl.yoyo.org/adservers/
#
# disable Window$ Update
#
# dl $tf 'https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/update.txt'
# dl $tf 'https://raw.githubusercontent.com/schrebra/Windows.10.DNS.Block.List/main/hosts.txt'
#
# following list included microsoft
#
# dl $tf 'https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/extra.txt'

echo "Overwriting $target..."
cat /dev/null > $target

echo "0.0.0.0  changmw2.debug.haha" >> $tf
pp2 0 $tf $target

cat /dev/null > $tf
cat /dev/null > $tf2

if true ; then
  echo -e '\033[1mPhase 2 - one-column\033[0m'

  dl $tf 'https://gitlab.com/quidsup/notrack-blocklists/-/raw/master/malware.list'
  dl $tf 'https://raw.githubusercontent.com/mkaand/youtube-ads-blocker-ddwrt/master/domainlist.txt'

  dl $tf 'https://raw.githubusercontent.com/hagezi/dns-blocklists/main/domains/native.huawei.txt'
  dl $tf 'https://raw.githubusercontent.com/hagezi/dns-blocklists/main/domains/native.tiktok.txt'
  dl $tf 'https://raw.githubusercontent.com/hagezi/dns-blocklists/main/domains/native.winoffice.txt'

  # Affects Scrabble Go and possibly all iOS games
  # dl $tf 'https://raw.githubusercontent.com/hagezi/dns-blocklists/main/domains/native.apple.txt'

  dl $tf 'https://raw.githubusercontent.com/hagezi/dns-blocklists/main/domains/doh.txt'

  # huge list
  # dl $tf 'https://raw.githubusercontent.com/hagezi/dns-blocklists/main/domains/tif.txt'

  dl $tf 'https://raw.githubusercontent.com/matomo-org/referrer-spam-blacklist/master/spammers.txt'
  dl $tf 'https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt'
 
  # Affect Scrabble Go
  # dl $tf2 'https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt'
  # grep Tracker /tmp/tmp2 | cut -d ' #' -f 1 >> $tf
  #
  # dl $tf2 'https://api.hackertarget.com/hostsearch/?q=googlevideo.com'
  # cat $tf2 | cut -d "," -f 1 >> $tf

  # Affects Scrabble Go
  # dl $tf 'https://raw.githubusercontent.com/anudeepND/youtubeadsblacklist/master/domainlist.txt'
  # dl $tf 'https://dbl.oisd.nl/basic/'

  echo "changmw1.debug.haha" >> $tf
fi

pp1 0 $tf $target
cat /dev/null > $tf

if true ; then
  echo -e '\033[1mPhease 3\033[0m'
  #
  # GitHub - Ewpratten/youtube_ad_blocklist: This is an open project to maintain
  # a list of domain names that serve YouTube ads
  # https://github.com/Ewpratten/youtube_ad_blocklist
  #
  # following affects Scrabble Go
  # dl $tf 'http://gh-pages.ewpratten.com/youtube_ad_blocklist/unbound.txt'
fi

cat $tf >> $target

echo "Sorting and removing duplicates into $tf..."
sort $target | uniq > $tf

echo "Removing invalid records in $tf ..."
grep -v -E '".#"|"#."' $tf | grep -v '"#==' | grep -v '"."' | grep -v '"0.0.0.0"' > $target

echo -e "Output file: \033[1m$target\033[0m"

echo -e "Removing temp files \033[1m$tf\033[0m"
rm $tf $tf2

echo -e '\033[1mDone\033[0m\007'
exit 0

_________________
Router: Asus RT-N18U (rev. A1)

Drink, Blink, Stretch! Live long and prosper! May the Force and farces be with you!

Facebook: https://www.facebook.com/changmanwai
Website: https://sites.google.com/site/changmw
SETI@Home profile: http://setiathome.berkeley.edu/view_profile.php?userid=211832
GitHub: https://github.com/changmw/changmw
itwontbewe
DD-WRT User


Joined: 29 Sep 2020
Posts: 260
Location: United States

PostPosted: Wed May 24, 2023 17:41    Post subject: Reply with quote
i have a question about behavior of DoT

when i run the below in cli
tcpdump -n -i eth0 'port 853'

the output is
IP 9.9.9.9.853 > my IP address.5 digit number:

is that the correct behavior?

i thought it would be
IP 9.9.9.9.853 > 127.0.0.1.5 digit number:

thanks
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 6410
Location: UK, London, just across the river..

PostPosted: Wed May 24, 2023 18:33    Post subject: Reply with quote
itwontbewe wrote:
i have a question about behavior of DoT

when i run the below in cli
tcpdump -n -i eth0 'port 853'

the output is
IP 9.9.9.9.853 > my IP address.5 digit number:

is that the correct behavior?

i thought it would be
IP 9.9.9.9.853 > 127.0.0.1.5 digit number:

thanks


I guess yes, as eth0 is the WAN port...check br0 instead and it would be 127.0.0.1 ect. the loopback interface...

tcpdump -nnS -i br0 'port 853'

_________________
Atheros
TP-Link WR740Nv1 ---DD-WRT 55179 WAP
TP-Link WR1043NDv2 -DD-WRT 55303 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55460 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55460 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55363 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
itwontbewe
DD-WRT User


Joined: 29 Sep 2020
Posts: 260
Location: United States

PostPosted: Wed May 24, 2023 18:53    Post subject: Reply with quote
with
tcpdump -nnS -i br0 'port 853'

i didn't get any output

your explanation about the other script looking on wan port makes sense thanks
mwchang
DD-WRT Guru


Joined: 26 Mar 2013
Posts: 1855
Location: Hung Hom, Hong Kong

PostPosted: Sat Jan 13, 2024 11:03    Post subject: Reply with quote
Came across this website while watching a Pi-Hole YouTube video:

The Big Blocklist Collection ¦ Firebog
https://firebog.net/

And lately some users are talking about alternatives:

DD-WRT :: View topic - [Complete GUIDE] AdGuard Home on DD-WRT
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=335497

DD-WRT :: View topic - SMARTDNS Guide- W.I.P.
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=323896

_________________
Router: Asus RT-N18U (rev. A1)

Drink, Blink, Stretch! Live long and prosper! May the Force and farces be with you!

Facebook: https://www.facebook.com/changmanwai
Website: https://sites.google.com/site/changmw
SETI@Home profile: http://setiathome.berkeley.edu/view_profile.php?userid=211832
GitHub: https://github.com/changmw/changmw
Goto page Previous  1, 2, 3, 4, 5 Display posts from previous:    Page 5 of 5
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum