• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

ATT Uverse RG Bypass (0.2 BTC)

Scheduled Pinned Locked Moved Bounties
555 Posts 80 Posters 1.2m Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bk150 @bkatt
    last edited by Nov 24, 2020, 5:41 PM

    @bkatt said in ATT Uverse RG Bypass (0.2 BTC):

    @shad0wca7 said in ATT Uverse RG Bypass (0.2 BTC):

    supplicant mode

    No updates this this thread in a while. Anyone have any luck recently with supplicant mode on bare hardware?

    I'm still running supplicant mode on my SG-5100 without any issues.

    B 1 Reply Last reply Nov 24, 2020, 5:56 PM Reply Quote 0
    • G
      GPz1100
      last edited by Nov 24, 2020, 5:54 PM

      You can get around the vlan0 requirement by using a dumb switch between the ONT and pf/ontsense box.

      1 Reply Last reply Reply Quote 0
      • B
        bkatt @bk150
        last edited by bkatt Nov 24, 2020, 5:57 PM Nov 24, 2020, 5:56 PM

        @bk150 A few different people were having issues. Specifically I and a few others were having waiting for auth issue. ATT fiber installed in the area about 2 years ago now, so may be that has newer firmware not allowing that method to work. Or could be something I am doing wrong. Who knows. I have the bridge netgraph working for last few months, I guess close enough.

        1 Reply Last reply Reply Quote 0
        • V
          vesalius @fresnoboy
          last edited by Nov 24, 2020, 9:02 PM

          @fresnoboy any post or walk through you know of on doing this, bridging or supplicant, when virtualizing pfSense. Interested in doing this on Proxmox, but want to be less ignorant about it before attempting.

          1 Reply Last reply Reply Quote 0
          • A
            AiC0315
            last edited by Nov 24, 2020, 9:05 PM

            I was running the supplicant bypass with the certs, that quit working for me. Then I was using the RG connected bypass and about a week or two ago that quite working as well.

            P 1 Reply Last reply Nov 25, 2020, 2:11 PM Reply Quote 0
            • P
              pyrodex @AiC0315
              last edited by Nov 25, 2020, 2:11 PM

              @AiC0315

              Apparently the people who had their just stop working with any method of bypass is most likely due to upgrades in your area to XGS-PON. Supposedly the certificate isn’t enough anymore and looks like AT&T has added more checks to TR-069 that exists on the RG. Smart people are looking into it but as AT&T moves away from the separate ONT and to a combo RG/ONT this maybe dead on the vine.

              A 1 Reply Last reply Nov 25, 2020, 9:43 PM Reply Quote 0
              • A
                AiC0315 @pyrodex
                last edited by Nov 25, 2020, 9:43 PM

                @pyrodex
                I had read about that over on the dsl forums. It's a shame, it was working very well. I am hoping someone figures out the magic solution to the new ONT/RG. Even though it has WIFI 6, i just dont want their crap in the way.

                1 Reply Last reply Reply Quote 0
                • T
                  t41k2m3
                  last edited by Feb 18, 2021, 8:01 PM

                  If supplicant mode still works for you in 2.4.5-p1, has anyone tried if it still works in pfsense+ 21.02 (or pfsense ce 2.5.0)?

                  D 1 Reply Last reply Apr 11, 2021, 6:23 PM Reply Quote 0
                  • D
                    Darth Android @t41k2m3
                    last edited by Apr 11, 2021, 6:23 PM

                    @t41k2m3 I was able to just update from 2.4.5 to 2.5.0 using the update button in the web config and everything continued to work. System updated, rebooted, and automatically reconnected.

                    F 1 Reply Last reply Apr 11, 2021, 6:46 PM Reply Quote 0
                    • F
                      fresnoboy @Darth Android
                      last edited by Apr 11, 2021, 6:46 PM

                      @darth-android

                      This is great news. Are you using the WPA supplicant or the bridging approach with the RG?

                      D 1 Reply Last reply Apr 11, 2021, 7:03 PM Reply Quote 0
                      • D
                        Darth Android @fresnoboy
                        last edited by Apr 11, 2021, 7:03 PM

                        @fresnoboy I'm using wpa_supplicant with extracted certificates at the moment. RG continues to sit in a box in the closet.

                        I did double-check my previous tweaks to pfatt.sh mentioned earlier in this thread, and they are still required for wpa_supplicant to work for me (notably, wpa_supplicant has to run on the raw interface, not the ngeth0 interface that has vlan0 headers stripped).

                        I've been trying to further tweak the script so that it no longer hangs on bootup if the router can't get an IP for any reason, which I've found to be a particular annoyance, but luckily everything has been super stable so it's mostly only an issue when I'm tinkering with things. If I get something working I'll upload/post it.

                        F 1 Reply Last reply Apr 11, 2021, 7:11 PM Reply Quote 0
                        • F
                          fresnoboy @Darth Android
                          last edited by Apr 11, 2021, 7:11 PM

                          @darth-android said in ATT Uverse RG Bypass (0.2 BTC):

                          @fresnoboy I'm using wpa_supplicant with extracted certificates at the moment. RG continues to sit in a box in the closet.

                          I did double-check my previous tweaks to pfatt.sh mentioned earlier in this thread, and they are still required for wpa_supplicant to work for me (notably, wpa_supplicant has to run on the raw interface, not the ngeth0 interface that has vlan0 headers stripped).

                          I've been trying to further tweak the script so that it no longer hangs on bootup if the router can't get an IP for any reason, which I've found to be a particular annoyance, but luckily everything has been super stable so it's mostly only an issue when I'm tinkering with things. If I get something working I'll upload/post it.

                          That sounds great. I run pfsense as a VM under a vmware host, so I deal with the vlan0 tagging that way and don't use ngeth at all anymore.

                          As a VM it's easy to take a snapshot and revert, so I'll try the upgrade and see if I have the same success. Thanks for posting here!

                          F 1 Reply Last reply Apr 12, 2021, 5:50 PM Reply Quote 1
                          • F
                            fresnoboy @fresnoboy
                            last edited by fresnoboy Apr 12, 2021, 6:17 PM Apr 12, 2021, 5:50 PM

                            @fresnoboy

                            I did the upgrade to 2.5.0 today. Went fine, and no issues with the pfatt WPA supplicant working in 2.5.0. Pretty smooth overall.

                            Hopefully this solves the occasional mbuf panics I was seeing in 2.4.5p1

                            F 1 Reply Last reply Apr 12, 2021, 8:03 PM Reply Quote 0
                            • F
                              fresnoboy @fresnoboy
                              last edited by Apr 12, 2021, 8:03 PM

                              @fresnoboy

                              So there is an issue. the wpa_supplicant on my system is showing 100% CPU utilization on one if the 4 CPUs. are other people seeing this too?

                              Note in my situation I am not using ngeth0 at all - just a pure bypass with the certs, and vmware doing the vlan0 processing.

                              This actually may have been going on before - as CPU usage seemed high before I made the transition earlier.

                              U D 2 Replies Last reply Apr 12, 2021, 10:01 PM Reply Quote 0
                              • U
                                untamedgorilla @fresnoboy
                                last edited by Apr 12, 2021, 10:01 PM

                                @fresnoboy

                                That's actually the issue that has been going on. That's why i haven't upgraded yet, i noticed in the github issues. There hasn't been an update in a bit. I was waiting for the next incremental release to see if anything changes.

                                F 1 Reply Last reply Apr 14, 2021, 8:41 PM Reply Quote 0
                                • F
                                  fresnoboy @untamedgorilla
                                  last edited by Apr 14, 2021, 8:41 PM

                                  @untamedgorilla

                                  And just FYI, 2.5.1 doesn't fix the wpa supplicant CPU locked at 100% problem. But so far, no mbuf panic either.

                                  F 1 Reply Last reply Apr 16, 2021, 4:36 AM Reply Quote 0
                                  • F
                                    fresnoboy @fresnoboy
                                    last edited by fresnoboy Apr 16, 2021, 4:39 AM Apr 16, 2021, 4:36 AM

                                    @fresnoboy

                                    I think I may have figured out the problem. See here: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=252844 It seems this is the likely issue with the wpa-supplicant running at 100%, since we start it before the routing table is populated as well. The fix there would may solve our problem as well.

                                    U 1 Reply Last reply Apr 16, 2021, 12:37 PM Reply Quote 0
                                    • U
                                      untamedgorilla @fresnoboy
                                      last edited by Apr 16, 2021, 12:37 PM

                                      @fresnoboy said in ATT Uverse RG Bypass (0.2 BTC):

                                      https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=252844

                                      So does the kill and restart of supplicant fix the issue?

                                      1 Reply Last reply Reply Quote 0
                                      • D
                                        Darth Android @fresnoboy
                                        last edited by Apr 16, 2021, 1:26 PM

                                        @fresnoboy I did notice this as well after upgrading, but I simply killed & restarted wpa_supplicant and things seem to be holding fine. I’ve not rebooted the box since then, so perhaps I’ll re-encounter it at such a time. Things are still working at the moment, so I’m inclined to just not touch anything, but if there’s a fix to test ping me and I can take a look.

                                        1 Reply Last reply Reply Quote 0
                                        • T
                                          t41k2m3
                                          last edited by Apr 16, 2021, 1:36 PM

                                          @fresnoboy have you looked into applying the patch to pfs or would that not be easy/possible?

                                          F N 2 Replies Last reply Apr 16, 2021, 7:50 PM Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            [[user:consent.lead]]
                                            [[user:consent.not_received]]