• SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Recent content by JuanGF

  1. J

    Release Asuswrt-Merlin 3006.102.6 is now available

    I'll be finally updating my AXE16000 + XT12 (2x mesh) from 3004_388.8_4 to 3006_102.6_0 Is is better to start with the XT12 nodes or with the AXE16000? I'll do factory reset of all of them ofc.
  2. J

    RT-AX86UPro - Should I upgrade from 3004 to 3006 now?

    I'm in the same situation, I have an AXE16000 + two XT12 in mesh, and I really need them to work as solid as they are now. I gave myself 6 months before upgrading but I read some stories about the wifi / mesh drivers in the final version being older/worse/more unstable than the ones in the...
  3. J

    Skynet What are some good current block lists? - Skynet

    Thank! Somehow I missed I can import whitelists too. That list seems abandoned, https://github.com/SecOps-Institute/Tor-IP-Addresses three months without updates. The project publishes the list on their own, I imported it no issues: https://check.torproject.org/torbulkexitlist
  4. J

    Skynet Dual-WAN support?

    It seems my logs are in /tmp/ and not in /jffs/ . This is the output: /tmp/syslog.log:May 8 02:49:56 custom_script: Running /jffs/scripts/firewall-start (args: ppp0)
  5. J

    Skynet What are some good current block lists? - Skynet

    Let me change the question: what are some good current allow lists? In my case I would like to whitelist all TOR exit nodes in my firewall, there are well mantained ones like https://www.dan.me.uk/torlist/?exit but I don't think I can use a list to allow in Skynet, can I?
  6. J

    Inadyn Cloudflare DDNS Help?

    This is my config file for Dual Wan, using IPv4. I have three records being updated, first block gets the IP connecting to the internet, the other two using nvram. #Default method - connects to Cloudflare and gets the outbound IP provider cloudflare.com:1 { username = yourdomain.com...
  7. J

    Skynet Dual-WAN support?

    I don't get anything with that command.
  8. J

    Skynet Dual-WAN support?

    Is this still true? I have Dual Wan in Load Balance and Skynet logs only seems to be aware of ppp0 (Primary WAN)
  9. J

    Skynet Skynet - Blocked outbounds coming from the router itself?

    There's been zero outbound blockings since I removed Let's Encrypt, so it was definitely that. Thanks for the help, I'd never had figure that out myself. Still I can't understand how having those port forwarding rules made the log to show outbound connections to (unrelated?) IPs. I put the top...
  10. J

    Skynet Skynet - Blocked outbounds coming from the router itself?

    But would still be an inbound block, right? Skynet identifies these blocks as outbounds originating in 192.168.2.1 This: :balance - [0:0] [5022:516817] -A PREROUTING -i br0 -m state --state NEW -j balance [3778:354019] -A balance -d 192.168.2.0/24 -j RETURN [0:0] -A balance -d 10.0.9.154/32...
  11. J

    Skynet Skynet - Blocked outbounds coming from the router itself?

    I've deactivated Let's Encrypt, which wasn't working anyway, now the iptables it is: [0:0] -A balance -p tcp -m tcp --dport 8443 -j RETURN But how is Let's Encrypt, or the port forwards it creates, related to the outbound connections to IPs in the Skynet blacklist? I would like to understand...
  12. J

    Skynet Skynet - Blocked outbounds coming from the router itself?

    I also have a DDNS script using inadyn to update an A record in Cloudflare with my WAN IP. As explained here: https://www.snbforums.com/threads/inadyn-cloudflare-ddns-help.82119/ Seems unrelated but just in case.
  13. J

    Skynet Skynet - Blocked outbounds coming from the router itself?

    Not that I'm aware of creating myself [121:6132] -A VSERVER -p tcp -m tcp --dport 8443 -j DNAT --to-destination 192.168.2.1:8443 [39:2260] -A balance -p tcp -m tcp --dport 8443 -j RETURN [122:6192] -A INPUT -d 192.168.2.1/32 -p tcp -m tcp --dport 8443 -j ACCEPT
  14. J

    Skynet Skynet - Blocked outbounds coming from the router itself?

    Yes, it is tcp 0 0 127.0.0.1:8443 0.0.0.0:* LISTEN 2655/httpds tcp 0 0 192.168.2.1:8443 0.0.0.0:* LISTEN 2655/httpds
Back
Top