Experimental Gargoyle 1.15.x (released as 1.14) beta 20230124

Want to share your OpenWrt / Gargoyle knowledge? Implemented a new feature? Let us know here.

Moderator: Moderators

rg66
Posts: 37
Joined: Sat Jan 14, 2023 8:07 am

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by rg66 »

Yes, I added the repos first and also ran gpkg update.

Code: Select all

Lantis_Default > https://lantisproject.com/gargoyle_custom/1.15.x_2203_test_builds/ramips/default/
Lantis_Kernel_Specific > https://lantisproject.com/gargoyle_custom/1.15.x_2203_test_builds/ramips/default_kernelspecific/
Here is the output with the same outcome.

Code: Select all

root@Gargoyle:~# gpkg update
Downloading package list for openwrt_22.03-SNAPSHOT_telephony source...
Package list for openwrt_22.03-SNAPSHOT_telephony downloaded successfully.

Downloading package list for gargoyle_kernel_specific source...
Package list for gargoyle_kernel_specific downloaded successfully.

Downloading package list for Lantis_Default source...
Package list for Lantis_Default downloaded successfully.

Downloading package list for gargoyle source...
Package list for gargoyle downloaded successfully.

Downloading package list for Lantis_Kernel_Specific source...
Package list for Lantis_Kernel_Specific downloaded successfully.

Downloading package list for openwrt_22.03-SNAPSHOT_routing source...
Package list for openwrt_22.03-SNAPSHOT_routing downloaded successfully.

Downloading package list for openwrt_22.03-SNAPSHOT_base source...
Package list for openwrt_22.03-SNAPSHOT_base downloaded successfully.

Downloading package list for openwrt_22.03-SNAPSHOT_packages source...
Package list for openwrt_22.03-SNAPSHOT_packages downloaded successfully.

root@Gargoyle:~# gpkg install kmod-leds-gpio
ERROR: Dependency kernel (= 5.10.166-1-96bbee78dc257b8273b74d6c74003dfa) of package kmod-leds-gpio is installed,
                but has incompatible version 5.10.166-1-9caa2dc205ae60d63831805d3194af38
root@Gargoyle:~#

Lantis
Moderator
Posts: 6735
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Lantis »

rg66 wrote:
Sat Apr 01, 2023 1:01 am
Yes, I added the repos first and also ran gpkg update.

Code: Select all

Lantis_Default > https://lantisproject.com/gargoyle_custom/1.15.x_2203_test_builds/ramips/default/
Lantis_Kernel_Specific > https://lantisproject.com/gargoyle_custom/1.15.x_2203_test_builds/ramips/default_kernelspecific/
Here is the output with the same outcome.

Code: Select all

root@Gargoyle:~# gpkg install kmod-leds-gpio
ERROR: Dependency kernel (= 5.10.166-1-96bbee78dc257b8273b74d6c74003dfa) of package kmod-leds-gpio is installed,
                but has incompatible version 5.10.166-1-9caa2dc205ae60d63831805d3194af38
root@Gargoyle:~#
Like i said, you need to use mt76x8 repo. Use the following:

Code: Select all

Lantis_mt76x8 > https://lantisproject.com/gargoyle_custom/1.15.x_2203_test_builds/ramips/mt76x8
Lantis_mt76x8_Kernel > https://lantisproject.com/gargoyle_custom/1.15.x_2203_test_builds/ramips/mt76x8_kernelspecific
Your error is saying you have kernel version:
5.10.166-1-9caa2dc205ae60d63831805d3194af38 <-- mt76x8
but the package is expecting
5.10.166-1-96bbee78dc257b8273b74d6c74003dfa <-- default

And if you inspect the difference between the default and mt76x8 repos, you'll see these two IDs :)
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

rg66
Posts: 37
Joined: Sat Jan 14, 2023 8:07 am

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by rg66 »

kmod-leds-gpio installed and working, thanks for your help.

Since the firmware was in the /ramips dir I assumed it was the right repo. I misread your post and didn't even see the /mt76x8 dirs at the bottom.

Thanks again

Lantis
Moderator
Posts: 6735
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Lantis »

Great thanks for checking.
I'll fix it up so that is installed by default moving forward.
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

Maniac
Posts: 76
Joined: Wed Sep 02, 2009 7:52 pm

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Maniac »

Lantis wrote:
Tue Mar 28, 2023 8:14 am
Maniac wrote:
Fri Mar 24, 2023 1:53 am
@Lantis any chance you could add the Belkin F9K1115v2 to the ath79 builds? It's supported in OpenWRT. Thanks!
Building a test image overnight, will upload for you and if it tests fine happy to include it.
Thanks will give it a shot soon!

ektus
Posts: 241
Joined: Sun Aug 11, 2013 2:26 am
Location: Germany

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ektus »

Just a short feedback:
Installed the version from February 26th, 2023 successfully on
1) one of my TP-Link TL-WR1043ND V2 routers (sysupgrade), but had to revert back due to problems with my reverse wifi bridge setup.
2) my spare Archer C7 V5 (factory) in order to prepare it for main router duty. Worked flawlessly so far, now I've got the new task of somehow moving over the approx. 80 DHCP assignments from the production router. And the VPN access settings, or do I have to distribute new keys to the remote devices for accessing the home network externally?

rg66
Posts: 37
Joined: Sat Jan 14, 2023 8:07 am

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by rg66 »

Gargoyle Version: 1.15.X (Built 20230219-2353 git@d78aeafe)
Model: TP-Link TL-MR3420 v5
Device Configuration: Gateway
Memory Usage: 21.5MB / 57.1MB (37.7%)

Flashed with tftpd and installed kmod-leds-gpio (thanks to Lantis)

Setup and old 512MB thumb drive as extroot and Installed:
plugin-gargoyle-webshell
plugin-gargoyle-diagnostics
plugin-gargoyle-logread
plugin-gargoyle-theme-xeye

Did all my quota and restrictions config (kids!) and added it to my network replacing a TL-MR3420 v2 with Gargoyle 1.10.0

So far so good, the only thing I've noticed was that Status > Overview > LAN doesn't show port numbers for the 4 entries.

Will report back in a few days
Last edited by rg66 on Wed Apr 05, 2023 12:53 am, edited 1 time in total.

ispyisail
Moderator
Posts: 5180
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ispyisail »

And the VPN access settings, or do I have to distribute new keys to the remote devices for accessing the home network externally?
I have the same problem :(

Lantis
Moderator
Posts: 6735
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Lantis »

Unfortunately OpenVPN has had quite a few updates to how it handles ciphers and while i'm sure you could migrate your settings (manually), it may be best to regenerate and distribute.
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

ektus
Posts: 241
Joined: Sun Aug 11, 2013 2:26 am
Location: Germany

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ektus »

Tried to copy over the existing config, but got no working openVPN Server yet. It's running, but can't decode the connection request. So I let it be, installed this version on another Archer C7 V5 and tried to setup openVPN Server from scratch on that one. Big failure at the very beginning when initialising the Public Key infrastucture:

Code: Select all

Thu Apr  6 17:10:43 2023 daemon.warn openvpn(custom_config)[7334]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Thu Apr  6 17:10:43 2023 daemon.warn openvpn(custom_config)[7334]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr  6 17:10:43 2023 daemon.notice openvpn(custom_config)[7334]: Diffie-Hellman initialized with 1024 bit key
Thu Apr  6 17:10:43 2023 daemon.err openvpn(custom_config)[7334]: ERROR: Failed to stat CRL file during initialization, exiting.
Thu Apr  6 17:10:43 2023 daemon.notice openvpn(custom_config)[7334]: Exiting due to fatal error
Thu Apr  6 17:10:46 2023 daemon.err uhttpd[2825]: sh: write error: Broken pipe
Thu Apr  6 17:10:48 2023 daemon.warn openvpn(custom_config)[7613]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Thu Apr  6 17:10:48 2023 daemon.notice openvpn(custom_config)[7613]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr  6 17:10:48 2023 daemon.notice openvpn(custom_config)[7613]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Thu Apr  6 17:10:48 2023 daemon.notice openvpn(custom_config)[7613]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Apr  6 17:10:48 2023 daemon.notice openvpn(custom_config)[7613]: net_route_v4_best_gw result: via 192.168.0.180 dev wlan1
Thu Apr  6 17:10:48 2023 daemon.warn openvpn(custom_config)[7613]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Thu Apr  6 17:10:48 2023 daemon.warn openvpn(custom_config)[7613]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr  6 17:10:48 2023 daemon.notice openvpn(custom_config)[7613]: Diffie-Hellman initialized with 1024 bit key
Thu Apr  6 17:10:48 2023 daemon.err openvpn(custom_config)[7613]: ERROR: Failed to stat CRL file during initialization, exiting.
Thu Apr  6 17:10:48 2023 daemon.notice openvpn(custom_config)[7613]: Exiting due to fatal error
Thu Apr  6 17:10:53 2023 daemon.warn openvpn(custom_config)[7624]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Thu Apr  6 17:10:53 2023 daemon.notice openvpn(custom_config)[7624]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr  6 17:10:53 2023 daemon.notice openvpn(custom_config)[7624]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Thu Apr  6 17:10:53 2023 daemon.notice openvpn(custom_config)[7624]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Apr  6 17:10:53 2023 daemon.notice openvpn(custom_config)[7624]: net_route_v4_best_gw result: via 192.168.0.180 dev wlan1
Thu Apr  6 17:10:53 2023 daemon.warn openvpn(custom_config)[7624]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Thu Apr  6 17:10:53 2023 daemon.warn openvpn(custom_config)[7624]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr  6 17:10:53 2023 daemon.notice openvpn(custom_config)[7624]: Diffie-Hellman initialized with 1024 bit key
Thu Apr  6 17:10:53 2023 daemon.err openvpn(custom_config)[7624]: ERROR: Failed to stat CRL file during initialization, exiting.
Thu Apr  6 17:10:53 2023 daemon.notice openvpn(custom_config)[7624]: Exiting due to fatal error
Thu Apr  6 17:10:58 2023 daemon.warn openvpn(custom_config)[7635]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Thu Apr  6 17:10:58 2023 daemon.notice openvpn(custom_config)[7635]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr  6 17:10:58 2023 daemon.notice openvpn(custom_config)[7635]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Thu Apr  6 17:10:58 2023 daemon.notice openvpn(custom_config)[7635]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Apr  6 17:10:58 2023 daemon.notice openvpn(custom_config)[7635]: net_route_v4_best_gw result: via 192.168.0.180 dev wlan1
Thu Apr  6 17:10:58 2023 daemon.warn openvpn(custom_config)[7635]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Thu Apr  6 17:10:58 2023 daemon.warn openvpn(custom_config)[7635]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr  6 17:10:58 2023 daemon.notice openvpn(custom_config)[7635]: Diffie-Hellman initialized with 1024 bit key
Thu Apr  6 17:10:58 2023 daemon.err openvpn(custom_config)[7635]: ERROR: Failed to stat CRL file during initialization, exiting.
Thu Apr  6 17:10:58 2023 daemon.notice openvpn(custom_config)[7635]: Exiting due to fatal error
Thu Apr  6 17:11:00 2023 user.notice root: openvpn stopped, restarting
Thu Apr  6 17:11:01 2023 daemon.warn openvpn(custom_config)[7760]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Thu Apr  6 17:11:01 2023 daemon.notice openvpn(custom_config)[7760]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr  6 17:11:01 2023 daemon.notice openvpn(custom_config)[7760]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Thu Apr  6 17:11:01 2023 daemon.notice openvpn(custom_config)[7760]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Apr  6 17:11:01 2023 daemon.notice openvpn(custom_config)[7760]: net_route_v4_best_gw result: via 192.168.0.180 dev wlan1
Thu Apr  6 17:11:01 2023 daemon.warn openvpn(custom_config)[7760]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Thu Apr  6 17:11:01 2023 daemon.warn openvpn(custom_config)[7760]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr  6 17:11:01 2023 daemon.notice openvpn(custom_config)[7760]: Diffie-Hellman initialized with 1024 bit key
Thu Apr  6 17:11:01 2023 daemon.err openvpn(custom_config)[7760]: ERROR: Failed to stat CRL file during initialization, exiting.
Thu Apr  6 17:11:01 2023 daemon.notice openvpn(custom_config)[7760]: Exiting due to fatal error
Thu Apr  6 17:11:06 2023 daemon.warn openvpn(custom_config)[8135]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Thu Apr  6 17:11:06 2023 daemon.notice openvpn(custom_config)[8135]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr  6 17:11:06 2023 daemon.notice openvpn(custom_config)[8135]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Thu Apr  6 17:11:06 2023 daemon.notice openvpn(custom_config)[8135]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Apr  6 17:11:06 2023 daemon.notice openvpn(custom_config)[8135]: net_route_v4_best_gw result: via 192.168.0.180 dev wlan1
Thu Apr  6 17:11:06 2023 daemon.warn openvpn(custom_config)[8135]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Thu Apr  6 17:11:06 2023 daemon.warn openvpn(custom_config)[8135]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr  6 17:11:06 2023 daemon.notice openvpn(custom_config)[8135]: Diffie-Hellman initialized with 1024 bit key
Thu Apr  6 17:11:06 2023 daemon.err openvpn(custom_config)[8135]: ERROR: Failed to stat CRL file during initialization, exiting.
Thu Apr  6 17:11:06 2023 daemon.notice openvpn(custom_config)[8135]: Exiting due to fatal error
Thu Apr  6 17:11:11 2023 daemon.warn openvpn(custom_config)[8152]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Thu Apr  6 17:11:11 2023 daemon.notice openvpn(custom_config)[8152]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Thu Apr  6 17:11:11 2023 daemon.notice openvpn(custom_config)[8152]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Thu Apr  6 17:11:11 2023 daemon.notice openvpn(custom_config)[8152]: net_route_v4_best_gw query: dst 0.0.0.0
Thu Apr  6 17:11:11 2023 daemon.notice openvpn(custom_config)[8152]: net_route_v4_best_gw result: via 192.168.0.180 dev wlan1
Thu Apr  6 17:11:11 2023 daemon.warn openvpn(custom_config)[8152]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Thu Apr  6 17:11:11 2023 daemon.warn openvpn(custom_config)[8152]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Apr  6 17:11:11 2023 daemon.notice openvpn(custom_config)[8152]: Diffie-Hellman initialized with 1024 bit key
Thu Apr  6 17:11:11 2023 daemon.err openvpn(custom_config)[8152]: ERROR: Failed to stat CRL file during initialization, exiting.
Thu Apr  6 17:11:11 2023 daemon.notice openvpn(custom_config)[8152]: Exiting due to fatal error

Post Reply