What's new

[Fork] Asuswrt-Merlin 374.43 LTS releases (Archive)

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

And the cable companies are not fond of revealing those.
I used admin and password for my Arris 6190 initial access. It offered to change the password at that point for future use.
 
Last edited:
Depends on the provider and modem. I have a retail CM600 and you set your own password (not locked out in their firmware).
My TP-Link modem lets me set my own password as well.
 
Depends on the provider and modem. I have a retail CM600 and you set your own password (not locked out in their firmware).
Spectrum (Charter) is tougher about this.
 
And for completeness....
What, no Asus?

3xX5hYE.jpg
 
43E6 is doing a great job on my N66. The ability to install all the good stuff like ntpMerlin and conmon via amtm and access them via the addons tab is excellent. Thank you so much for your work @john9527 & @thelonelycoder - and especially @Jack Yaz for the ntp script.

Btw Jack, the installation of ntpMerlin required /opt/bin/7z which is not part of the p7zip package (for MIPS?). However a symlink pointing to /opt/bin/7za solved that.
 
When I try to add a USB flash drive formatted with ext4 to my RT-N16 the amtm program sw (create swap file) can't see it(ran the "Disk Utility" feature on the Asuswrt GUI and it does nothing).

When I reformatted with ext3 and run the "Disk Utility" i see this:
==============================================
Tue Apr 21 11:36:39 DST 2020
ASUS_RT_N16 contains a file system with errors, check forced.
ASUS_RT_N16: Inode 8 has EXTENTS_FL flag set on filesystem without extents support.


ASUS_RT_N16: UNEXPECTED INCONSISTENCY; RUN fsck MANUALLY.
(i.e., without -a or -p options)
===============================================
edit: ASUS_RT_N16 is the label I created for the USB flash drive.

the amtm sw script does see the usb flash and offers to create the 1/2 GB swap file (which I did)

My question: I'm guessing/remembering that ext4 is a fairly recent linux file system. That's why my NT-16 couldn't see it. Should I have tried using only the ext2 file system rather than the ext3?
 
Last edited:
When I try to add a USB flash drive formatted with ext4 to my RT-N16 the amtm program sw (create swap file) can't see it(ran the "Disk Utility" feature on the Asuswrt GUI and it does nothing).

When I reformatted with ext3 and run the "Disk Utility" i see this:
==============================================
Tue Apr 21 11:36:39 DST 2020
ASUS_RT_N16 contains a file system with errors, check forced.
ASUS_RT_N16: Inode 8 has EXTENTS_FL flag set on filesystem without extents support.


ASUS_RT_N16: UNEXPECTED INCONSISTENCY; RUN fsck MANUALLY.
(i.e., without -a or -p options)
===============================================
edit: ASUS_RT_N16 is the label I created for the USB flash drive.

the amtm sw script does see the usb flash and offers to create the 1/2 GB swap file (which I did)

My question: I'm guessing/remembering that ext4 is a fairly recent linux file system. That's why my NT-16 couldn't see it. Should I have tried using only the ext2 file system rather than the ext3?
If you would have used amtm to format the device, the ext file system selector would have only shown compatible choices for your router.
 
@Wallace_n_Gromit I would try this.
  • Format the USB drive on a PC to NTFS
  • Plug it in your RT-N16 and run amtm and the fd command.
Done. :)
 
If you would have used amtm to format the device, the ext file system selector would have only shown compatible choices for your router.

@Wallace_n_Gromit I would try this.
  • Format the USB drive on a PC to NTFS
  • Plug it in your RT-N16 and run amtm and the fd command.
Done. :)

THAT DID IT!!!

The USB flash Drive was previously partitioned ext4 for a RT-68U. So. Since it wouldn't read/mount in the RT-N16 asuswrt GUI, or the ssh session, that's when I tried a windows partitioning tool to reformat it(again to ext4--wouldn't read/mount) then to ext3(with some errors to the drive--previously noted). Following your directions above, I get from the "Disk Utility" app on the asuswrt GUI:

Tue Apr 21 14:06:12 DST 2020
ASUS_RT_N16: clean, 258/977280 files, 632285/3907580 blocks

I then started a ssh session/amtm/fd (didn't even see "fd" while the USB drive was ext4/unmounted or ext3/with errors I seem to recall)

@thelonelycoder, is correct. The allowed partition types are only ext2 and ext3.

BTW, I was using @L&LD's posting "Quick and dirty (my install order for customer's routers, from scratch on RMerlin 384.15_0) :) :" as my step by step to install the various scripts.

Thanks!
 
Last edited:
I'm trying to adapt a guide(it's on russian, sorry :)) that was written for use with Padavan version of firmware. The main goal is to use TOR for unblocking resources blocked by provider listed in list-file.
I have installed Entware using amtm on USB-Flash drive, installed packets
Code:
opkg install tor tor-geoip bind-dig
The first problem is this script:
Code:
modprobe ip_set
modprobe ip_set_hash_ip
modprobe ip_set_hash_net
modprobe ip_set_bitmap_ip
modprobe ip_set_list_set
modprobe xt_set

ipset create unblock hash:net
I found those modules in list
Code:
modprobe ip_set
modprobe ip_set_iphash
modprobe ip_set_nethash
modprobe ip_set_setlist
But still can't find those 2:
Code:
ip_set_bitmap_ip
xt_set
Modified command still give me error:
Code:
User@ASUS-RT-N66R:/tmp/home/root# ipset --create test hash:net
ipset v4.5: Couldn't load settype `hash:net':File not found
The last thing is I need to add the script below after iptables reconfig
Code:
#!/bin/sh

### Custom user script
### Called after internal iptables reconfig (firewall update)

### Tor

iptables -t nat -A PREROUTING -i br0 -p tcp -m set --match-set unblock dst -j REDIRECT --to-port 9141
And I don't know where to place it and is it correct for this environment.
I just created file /jffs/scripts/services-start and placed all those commends there :rolleyes:
Please, help me to figure it out.
 
Last edited:
I'm trying to adapt a guide(it's on russian, sorry :)) that was written for use with Padavan version of firmware. The main goal is to use TOR for unblocking resources blocked by provider listed in list-file.
The first problem is this script:
Code:
modprobe ip_set
modprobe ip_set_hash_ip
modprobe ip_set_hash_net
modprobe ip_set_bitmap_ip
modprobe ip_set_list_set
modprobe xt_set

ipset create unblock hash:net
I found those modules in list
Code:
modprobe ip_set
modprobe ip_set_iphash
modprobe ip_set_nethash
modprobe ip_set_setlist
But still can't find those 2:
Code:
ip_set_bitmap_ip
xt_set
Modified command still give me error:
Code:
User@ASUS-RT-N66R:/tmp/home/root# ipset --create test hash:net
ipset v4.5: Couldn't load settype `hash:net':File not found
The last thing is I need to add the script below after iptables reconfig
Code:
#!/bin/sh

### Custom user script
### Called after internal iptables reconfig (firewall update)

### Tor

iptables -t nat -A PREROUTING -i br0 -p tcp -m set --match-set unblock dst -j REDIRECT --to-port 9141
And I don't know where to place it and is it correct for this environment.
I just created file /jffs/scripts/services-start and placed all those commends there :rolleyes:
Please, help me to figure it out.
Generally I think ipset on MIPS routers like the N66 is older and cannot support the modules that ARM routers do.

The iptables -t nat rules would be best in the /jffs/scripts/nat-start script, but it might not do so much good without the needed ipset features.
 
I'm trying to adapt a guide(it's on russian, sorry :)) that was written for use with Padavan version of firmware. The main goal is to use TOR for unblocking resources blocked by provider listed in list-file.
The first problem is this script:
Code:
modprobe ip_set
modprobe ip_set_hash_ip
modprobe ip_set_hash_net
modprobe ip_set_bitmap_ip
modprobe ip_set_list_set
modprobe xt_set

ipset create unblock hash:net
I found those modules in list
Code:
modprobe ip_set
modprobe ip_set_iphash
modprobe ip_set_nethash
modprobe ip_set_setlist
But still can't find those 2:
Code:
ip_set_bitmap_ip
xt_set
Modified command still give me error:
Code:
User@ASUS-RT-N66R:/tmp/home/root# ipset --create test hash:net
ipset v4.5: Couldn't load settype `hash:net':File not found
The last thing is I need to add the script below after iptables reconfig
Code:
#!/bin/sh

### Custom user script
### Called after internal iptables reconfig (firewall update)

### Tor

iptables -t nat -A PREROUTING -i br0 -p tcp -m set --match-set unblock dst -j REDIRECT --to-port 9141
And I don't know where to place it and is it correct for this environment.
I just created file /jffs/scripts/services-start and placed all those commends there :rolleyes:
Please, help me to figure it out.

Use this code at the top of your script to see if it helps
Code:
case $(ipset -v | grep -o "v[4,6]") in
  v6) MODULES="ARM"; MATCHSET='--match-set'; LIST='list'; CREATE='create'; SAVE='save'; RESTORE='restore'; FLUSH='flush'; DESTROY='destroy'; ADD='add'; SWAP='swap'; TEST='test'; DELETE="del"
      IPHASH='hash:ip'; NETHASH='hash:net'; PORTBITMAP="bitmap:port range 1-65535"; IPPORT=; SETNOTFOUND='name does not exist'; TIMEOUT='timeout'
      lsmod | grep -q "xt_set" || for module in ip_set ip_set_hash_net ip_set_hash_ip xt_set
      do modprobe $module; done;;
  v4) MODULES="MIPS";MATCHSET='--set'; LIST='--list'; CREATE='--create'; SAVE='--save'; RESTORE='--restore'; FLUSH='--flush'; DESTROY='--destroy'; ADD='--add'; SWAP='--swap'; TEST='--test'; DELETE="--del"
      IPHASH='iphash'; NETHASH='nethash'; PORTBITMAP="portmap --from 1 --to 65535"; IPPORT="ipporthash"; SETNOTFOUND='Unknown set'; TIMEOUT=; RETAIN_SECS=
      lsmod | grep -q "ipt_set" || for module in ip_set ip_set_nethash ip_set_iphash ipt_set
      do modprobe $module; done;;
  *) logger -st "($(basename $0))" $$ "**ERROR** Unknown ipset version: $(ipset -v). Exiting." && (echo -e "\a";exit 99);;
esac

So try
Code:
ipset $CREATE test $NETHASH
i.e. v4 'nethash' should be the equivalent of v6 'hash:net' syntax
 
@MON@H Rasta

The instructions you are working from were written for IPSET 6....The older kernel used in the N66 can only support IPSET 4. All of the modules have different names and some are not available in the older IPSET (I think bitmap is one of them). The equivalent to xt_set in IPSET 4 is ip_set

You may be able to get it to work (maybe with some limitations), but you're going to have to try and use the IPSET help to try and convert the commands.

EDIT: I see @Martineau gave you a good starting point.
 
Generally I think ipset on MIPS routers like the N66 is older and cannot support the modules that ARM routers do.

I found that out first hand when I was trying to install Skynet on my RT-N16 MIPS router:

Skynet install failed,
IPSet version on router not supported:

ipset v4.5, protocol version 4.
Kernel module protocol version 4.
 
I found that out first hand when I was trying to install Skynet on my RT-N16 MIPS router:

Skynet install failed,
IPSet version on router not supported:

ipset v4.5, protocol version 4.
Kernel module protocol version 4.
I probably just have an unhealthy relationship with Skynet, but I wonder if @Martineau post above might lead the way for a Skynet-stalker like me to fork Skynet for MIPS routers. Time to get the N66U out of the drawer...

@Adamm or @john9527 - any advice/pitfalls before I dig in?
 
Next release has been posted. This release provides support for the adding of custom pages to the WebUI by addons developers. There are a few other new features and updates, but no critical fixes. Install at your convenience :)

SNIP SNIP SNIP
[/CODE]

Hi John,

Are you also going to make the L builds again?
The older WiFi drivers would accept the higher Mw a bit better to my feeling.
 
Many thanks to @dave14305 @Martineau and @john9527
In case someone will be interested in this, I decided to share. Here is manual to configurate Asus RT-N66U (R/W) with [Fork] Asuswrt-Merlin 374.43 LTS release on board to use TOR for listed domains/IP's.
This manual is taken as the basis. Russian version (original) can be found here.
Kyrie1965 said:
It is important to note that my option is not intended for the case when you need to unlock hundreds and thousands of domains. Because when the router starts, each domain from the given list is resolved. The more domains in the list, the longer the initialization of many ipset to unlock.
For installation, we need a MicroSD (remove the cover and insert it into the slot inside the router) or a USB flash drive connected on an ongoing basis.
Use command
Code:
amtm
and follow instructions to install Entware
Code:
opkg update ; opkg upgrade ; opkg install tor tor-geoip bind-dig
Create file
Code:
nano /jffs/scripts/init_ipset.sh
with this content
Code:
modprobe ip_set
modprobe ip_set_iphash
modprobe ip_set_nethash
modprobe ip_set_setlist

ipset --create unblock iphash
Make it executable
Code:
chmod +x /jffs/scripts/init_ipset.sh
Edit startup script
Code:
nano /jffs/scripts/services-start
Add following
Code:
#!/bin/sh
# This script get called after all other system services
# have been started at boot on router
# ---------------------------------------------------------

# Cron job to install after reboot
cru a unblock-ipset "3 3 * * * /opt/bin/unblock_ipset.sh"

# Run script now
/jffs/scripts/init_ipset.sh
/opt/bin/unblock_ipset.sh
Make it executable
Code:
chmod +x /jffs/scripts/services-start
Edit this file
Code:
nano /jffs/scripts/nat-start
Add following line
Code:
#!/bin/sh

iptables -t nat -A PREROUTING -i br0 -p tcp -m set --set unblock dst -j REDIRECT --to-port 9141
Make it executable
Code:
chmod +x /jffs/scripts/nat-start
Deleting old config file
Code:
cat /dev/null > /opt/etc/tor/torrc
Edit file
Code:
nano /opt/etc/tor/torrc
Insert the lines below. Please note that the admin is the default username that is used for authorization in the web interface of the router. If you changed it, replace it with yours.
Code:
User admin
PidFile /opt/var/run/tor.pid
ExcludeExitNodes {RU},{UA},{AM},{KG},{BY}
StrictNodes 1
TransPort 192.168.1.1:9141
ExitRelay 0
ExitPolicy reject *:*
ExitPolicy reject6 *:*
GeoIPFile /opt/share/tor/geoip
GeoIPv6File /opt/share/tor/geoip6
DataDirectory /opt/var/lib/tor
  • Exclude output nodes: Russia, Ukraine, Armenia Kyrgyzstan, Belarus.
  • Hang a "transparent" proxy on the address 192.168.1.1, port 9141.
  • Deny be an exit point.
unblock.txt is a simple list to unlock. You can unlock the domain or IP address. One line - one element. Empty lines (including spaces and tabs) are ignored. You can use the # character at the beginning of a line to ignore it. Create a new file with the command
Code:
nano /opt/etc/unblock.txt
Insert your list into it
Code:
###Torrent Trackers
rutracker.org
rutor.info
rutor.is
mega-tor.org
kinozal.tv
nnm-club.me
nnm-club.ws
tfile.me
tfile-home.org
tfile1.cc
megatfile.cc
megapeer.org
megapeer.ru
tapochek.net
tparser.org
tparser.me
rustorka.com
uniongang.tv
fast-torrent.ru

###Catalogs of media content for programs
rezka.ag
hdrezka.ag
hdrezka.me
filmix.co
filmix.cc
seasonvar.ru

###Books
lib.rus.ec
flibusta.is
flibs.me
flisland.net
flibusta.site

###Telegram
telegram.org
tdesktop.com
tdesktop.org
tdesktop.info
tdesktop.net
telesco.pe
telegram.dog
telegram.me
t.me
telegra.ph
web.telegram.org
desktop.telegram.org
updates.tdesktop.com
venus.web.telegram.org
flora.web.telegram.org
vesta.web.telegram.org
pluto.web.telegram.org
aurora.web.telegram.org

###Miscellaneous
7-zip.org
edem.tv
4pna.com
2019.vote

###Tor check
check.torproject.org

###Example of unlocking by IP (remove # at the beginning of the line)
#195.82.146.214
Code:
nano /opt/bin/unblock_ipset.sh
Code:
#!/bin/sh

until ADDRS=$(dig +short google.com @localhost) && [ -n "$ADDRS" ] > /dev/null 2>&1; do sleep 5; done

while read line || [ -n "$line" ]; do

  [ -z "$line" ] && continue
  [ "${line:0:1}" = "#" ] && continue

  addr=$(echo $line | grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}')

  if [ ! -z "$addr" ]; then
    ipset --add unblock $addr
    continue
  fi
 
  dig +short $line @localhost | grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | awk '{system("ipset --add unblock "$1)}'

done < /opt/etc/unblock.txt
Code:
chmod +x /opt/bin/unblock_ipset.sh
Edit file
Code:
nano /opt/bin/unblock_dnsmasq.sh
Insert the lines below
Code:
#!/bin/sh

cat /dev/null > /opt/etc/unblock.dnsmasq

while read line || [ -n "$line" ]; do

  [ -z "$line" ] && continue
  [ "${line:0:1}" = "#" ] && continue

  echo $line | grep -Eq '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' && continue

  echo "ipset=/$line/unblock" >> /opt/etc/unblock.dnsmasq

done < /opt/etc/unblock.txt
Make it executable
Code:
chmod +x /opt/bin/unblock_dnsmasq.sh
Now execute
Code:
/opt/bin/unblock_dnsmasq.sh
Check that the file is created and has entries in it
Code:
cat /opt/etc/unblock.dnsmasq
Edit file
Code:
nano /opt/bin/unblock_update.sh
Insert the lines below
Code:
#!/bin/sh

ipset --flush unblock

/opt/bin/unblock_dnsmasq.sh
service restart_dhcpd
sleep 3
/opt/bin/unblock_ipset.sh &
Make it executable
Code:
chmod +x /opt/bin/unblock_update.sh
Create file
Code:
nano /opt/etc/init.d/S99unblock
Insert the lines below
Code:
#!/bin/sh

[ "$1" != "start" ] && exit 0

/opt/bin/unblock_ipset.sh &
Make it executable
Code:
chmod +x /opt/etc/init.d/S99unblock
We need to connect the created unblock.dnsmasq file to dnsmasq. To do this, open the file in the editor
Code:
nano /jffs/configs/dnsmasq.conf.add
Add to the end of the file:
Code:
conf-file=/opt/etc/unblock.dnsmasq
If you want (this is optional), you can add an additional server for resolution and reliability:
Code:
server=8.8.8.8
 
Last edited:

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top