It has been implemented in the firmware 4.x.
If you use vpn policy manual route setup, you can use one Openvpn and one Wireguard at the same time.
It has been implemented in the firmware 4.x.
If you use vpn policy manual route setup, you can use one Openvpn and one Wireguard at the same time.
mmm maybe I crossed-post the wrong feature.What I meant is the ability to have multiple Wireguard connections active at the same time, with the possibility to route different clients to different wireguard instances. So policy based routing based on the client, not on the target
In vanilla openwrt I believe it is possible to setup multiple wireguard tunnels as seperate interfaces and assign different vlans/wifi to them. It is just not quick and easy to switch to a different server.
Yes that is true. When everything needs to be set up manually, multiple interfaces is not a problems.
The most difficult set up is routing, what is the main reason that we made the modifications. Letās make one interface each protocol works first.
I am having problems with selecting customize routing rules to set both WG and OpenVPN at the same time. I hope you can implement multiple wireguard tunnels once you have ironed out the bugs.
Letās make one interface each protocol works first.
Sorry I didnāt get your last sentence, does this mean you are considering to implement the feature? I mean policy based routing based on the clientā¦
Hello. My request is about upgrade function to Samba\FTP\Sftp service because its have lot of problem when you use it not just like noob with anonymous access one button etc. And you are not professional openwrt user.
good day.
The current plan is for network storage to be refactored in 4.5 or 4.6 to address some of the issues.
It is planned that FTP will be added to this list. We will discuss about SFTP.
Although it is nice to see you have plans for firmware 4.5 and 4.6, some of us have been waiting for more then 2 years for 4.x for our routers, since @alzhao initial post that said 4.x would be available mid-2021. It would sure be nice to get 4.x across the full product line before everything earlier than the Flint goes EOL.
I donāt see it on the main list, so Iād like to add as feature requests. I have a GL-AX1800
I know itās all possible to set up through LuCi but it gets pretty complicated and takes a while.
It would be nice if the Puli could have services that use T-Mobile along with T-Mobile themselves added into the list of Operators that is shown in the drop down box when doing a Manual Setup and also use them when doing an Automatic Setup.
A couple more features:
This would be super useful when you want to use wireguard and your coworking space blocks everything but the web ports of 80 and 443.
Lets Encrypt ddns support, or āgl-inet ddns lets encrypt supportā: This would be useful so we can always have https:// on when we interact with the web interface externally and internally without having to use self signed certs
https by default vs http by default : typing in my password locally over http as a default can have it captured, even a self signed cert would be a minor improvement. Maybe a ui alert can show as an option on the login screen saying your on āhttp, click here for httpsā
Letsencrypt requires a domain name and requires an acme client to proof it controls the domains it requests the certificate for. Frequently this is done using a .well-known/acme-challenge file, which will need to be accessible from the internet on port 80. Technically the GL-inet DDNS could be used as domain, but would you really want a router to expose itself to the internet on port 80 for a letsencrypt certificate?
would you really want a router to expose itself to the internet on port 80 for a letsencrypt certificate?
Well there is already a choice to turn on external http / https access via the āEnable HTTP(S) Remote Accessā options on the router, so maybe yes? It would especially useful for people who turn on that option, that way they can more easily ensure they are not being spoofed and they have the webserver on anyway. Or GL-inet can become a certificate authority just for itās DDNS subdomains and do it automatically for all of their routers, you wouldnāt even need to involve lets encrypt for that.
But that is default off for security reasons (and also to allow someone to port-forward port 80 to whatever they would want.) The easiest way to keep things as save as possible is to limit the attack surface. Thatās one of the reasons nearly NO router does that by default. Having a letsencrypt certificate is not worth the security implications by exposing a web-server and possibly additional control systems!
That certificate authority would not be trusted by devices/browsers and encryption-wise it offers absolutely no additional strength. Nor would I trust GL-inet to be a CA.
The only difference between a CA-signed and self-signed certificate is that the first only has a trusted source telling that that certificate actually belongs to who it says it is. If you want to prevent some weird man-in-the-middle attack, just remember the certificateās its hashes and you would be able to determining if the cert is actually your routerās.
Nothing prevents you from doing letsencrypt with OpenWRT if you really want to do so. Acmebot should be available!
My 1st feature request is that for applicable particularly for those sold as Travel Routers the Country Code can be amended on the fly via the GLiNET App and in WebAdmin; and that the āUSā designation shown in the WebAdmin (that doesnāt change when you amend Country Code) is removed. See See GL-MT3000 Beryl AX - No Country Code Option in Luci? - #14 by SmurfonToast and Slate Plus Title Bar - #4 by SmurfonToast.
My 2nd feature request is that this feature request list is now reset to 2023 (as a new list). This old list is well into March 2023.
k.
Can anything be added to check which connection is currently active? I had a numerous occurrences when based on priority it was supposed to be Repeater (1) but Tethering (2) was used for some reason.
Iām using Tethering simply as a backup, it shouldnāt be used as main source of connection. Some kind of a indicator showing where is the traffic coming from would be really helpful. Also would be a bonus if there was a way to manually override it.
Dear Everyone,
Letās close this thread with a summary and start feature request 2023.