Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ATT Uverse RG Bypass (0.2 BTC)

    Scheduled Pinned Locked Moved Bounties
    555 Posts 80 Posters 1.2m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      bk150 @bkatt
      last edited by

      @bkatt said in ATT Uverse RG Bypass (0.2 BTC):

      @shad0wca7 said in ATT Uverse RG Bypass (0.2 BTC):

      supplicant mode

      No updates this this thread in a while. Anyone have any luck recently with supplicant mode on bare hardware?

      I'm still running supplicant mode on my SG-5100 without any issues.

      B 1 Reply Last reply Reply Quote 0
      • GPz1100G
        GPz1100
        last edited by

        You can get around the vlan0 requirement by using a dumb switch between the ONT and pf/ontsense box.

        1 Reply Last reply Reply Quote 0
        • B
          bkatt @bk150
          last edited by bkatt

          @bk150 A few different people were having issues. Specifically I and a few others were having waiting for auth issue. ATT fiber installed in the area about 2 years ago now, so may be that has newer firmware not allowing that method to work. Or could be something I am doing wrong. Who knows. I have the bridge netgraph working for last few months, I guess close enough.

          1 Reply Last reply Reply Quote 0
          • V
            vesalius @fresnoboy
            last edited by

            @fresnoboy any post or walk through you know of on doing this, bridging or supplicant, when virtualizing pfSense. Interested in doing this on Proxmox, but want to be less ignorant about it before attempting.

            1 Reply Last reply Reply Quote 0
            • A
              AiC0315
              last edited by

              I was running the supplicant bypass with the certs, that quit working for me. Then I was using the RG connected bypass and about a week or two ago that quite working as well.

              P 1 Reply Last reply Reply Quote 0
              • P
                pyrodex @AiC0315
                last edited by

                @AiC0315

                Apparently the people who had their just stop working with any method of bypass is most likely due to upgrades in your area to XGS-PON. Supposedly the certificate isn’t enough anymore and looks like AT&T has added more checks to TR-069 that exists on the RG. Smart people are looking into it but as AT&T moves away from the separate ONT and to a combo RG/ONT this maybe dead on the vine.

                A 1 Reply Last reply Reply Quote 0
                • A
                  AiC0315 @pyrodex
                  last edited by

                  @pyrodex
                  I had read about that over on the dsl forums. It's a shame, it was working very well. I am hoping someone figures out the magic solution to the new ONT/RG. Even though it has WIFI 6, i just dont want their crap in the way.

                  1 Reply Last reply Reply Quote 0
                  • T
                    t41k2m3
                    last edited by

                    If supplicant mode still works for you in 2.4.5-p1, has anyone tried if it still works in pfsense+ 21.02 (or pfsense ce 2.5.0)?

                    Darth AndroidD 1 Reply Last reply Reply Quote 0
                    • Darth AndroidD
                      Darth Android @t41k2m3
                      last edited by

                      @t41k2m3 I was able to just update from 2.4.5 to 2.5.0 using the update button in the web config and everything continued to work. System updated, rebooted, and automatically reconnected.

                      F 1 Reply Last reply Reply Quote 0
                      • F
                        fresnoboy @Darth Android
                        last edited by

                        @darth-android

                        This is great news. Are you using the WPA supplicant or the bridging approach with the RG?

                        Darth AndroidD 1 Reply Last reply Reply Quote 0
                        • Darth AndroidD
                          Darth Android @fresnoboy
                          last edited by

                          @fresnoboy I'm using wpa_supplicant with extracted certificates at the moment. RG continues to sit in a box in the closet.

                          I did double-check my previous tweaks to pfatt.sh mentioned earlier in this thread, and they are still required for wpa_supplicant to work for me (notably, wpa_supplicant has to run on the raw interface, not the ngeth0 interface that has vlan0 headers stripped).

                          I've been trying to further tweak the script so that it no longer hangs on bootup if the router can't get an IP for any reason, which I've found to be a particular annoyance, but luckily everything has been super stable so it's mostly only an issue when I'm tinkering with things. If I get something working I'll upload/post it.

                          F 1 Reply Last reply Reply Quote 0
                          • F
                            fresnoboy @Darth Android
                            last edited by

                            @darth-android said in ATT Uverse RG Bypass (0.2 BTC):

                            @fresnoboy I'm using wpa_supplicant with extracted certificates at the moment. RG continues to sit in a box in the closet.

                            I did double-check my previous tweaks to pfatt.sh mentioned earlier in this thread, and they are still required for wpa_supplicant to work for me (notably, wpa_supplicant has to run on the raw interface, not the ngeth0 interface that has vlan0 headers stripped).

                            I've been trying to further tweak the script so that it no longer hangs on bootup if the router can't get an IP for any reason, which I've found to be a particular annoyance, but luckily everything has been super stable so it's mostly only an issue when I'm tinkering with things. If I get something working I'll upload/post it.

                            That sounds great. I run pfsense as a VM under a vmware host, so I deal with the vlan0 tagging that way and don't use ngeth at all anymore.

                            As a VM it's easy to take a snapshot and revert, so I'll try the upgrade and see if I have the same success. Thanks for posting here!

                            F 1 Reply Last reply Reply Quote 1
                            • F
                              fresnoboy @fresnoboy
                              last edited by fresnoboy

                              @fresnoboy

                              I did the upgrade to 2.5.0 today. Went fine, and no issues with the pfatt WPA supplicant working in 2.5.0. Pretty smooth overall.

                              Hopefully this solves the occasional mbuf panics I was seeing in 2.4.5p1

                              F 1 Reply Last reply Reply Quote 0
                              • F
                                fresnoboy @fresnoboy
                                last edited by

                                @fresnoboy

                                So there is an issue. the wpa_supplicant on my system is showing 100% CPU utilization on one if the 4 CPUs. are other people seeing this too?

                                Note in my situation I am not using ngeth0 at all - just a pure bypass with the certs, and vmware doing the vlan0 processing.

                                This actually may have been going on before - as CPU usage seemed high before I made the transition earlier.

                                U Darth AndroidD 2 Replies Last reply Reply Quote 0
                                • U
                                  untamedgorilla @fresnoboy
                                  last edited by

                                  @fresnoboy

                                  That's actually the issue that has been going on. That's why i haven't upgraded yet, i noticed in the github issues. There hasn't been an update in a bit. I was waiting for the next incremental release to see if anything changes.

                                  F 1 Reply Last reply Reply Quote 0
                                  • F
                                    fresnoboy @untamedgorilla
                                    last edited by

                                    @untamedgorilla

                                    And just FYI, 2.5.1 doesn't fix the wpa supplicant CPU locked at 100% problem. But so far, no mbuf panic either.

                                    F 1 Reply Last reply Reply Quote 0
                                    • F
                                      fresnoboy @fresnoboy
                                      last edited by fresnoboy

                                      @fresnoboy

                                      I think I may have figured out the problem. See here: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=252844 It seems this is the likely issue with the wpa-supplicant running at 100%, since we start it before the routing table is populated as well. The fix there would may solve our problem as well.

                                      U 1 Reply Last reply Reply Quote 0
                                      • U
                                        untamedgorilla @fresnoboy
                                        last edited by

                                        @fresnoboy said in ATT Uverse RG Bypass (0.2 BTC):

                                        https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=252844

                                        So does the kill and restart of supplicant fix the issue?

                                        1 Reply Last reply Reply Quote 0
                                        • Darth AndroidD
                                          Darth Android @fresnoboy
                                          last edited by

                                          @fresnoboy I did notice this as well after upgrading, but I simply killed & restarted wpa_supplicant and things seem to be holding fine. I’ve not rebooted the box since then, so perhaps I’ll re-encounter it at such a time. Things are still working at the moment, so I’m inclined to just not touch anything, but if there’s a fix to test ping me and I can take a look.

                                          1 Reply Last reply Reply Quote 0
                                          • T
                                            t41k2m3
                                            last edited by

                                            @fresnoboy have you looked into applying the patch to pfs or would that not be easy/possible?

                                            F N 2 Replies Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.