|
|
Log in / Subscribe / Register

OpenWrt 22.03.0 released

Version 22.03.0 of the OpenWrt distribution for routers (and beyond) has been released. "It incorporates over 3800 commits since branching the previous OpenWrt 21.02 release and has been under development for about one year". Changes include a new firewall implementation using nftables, year-2038 readiness, dark mode in the LuCI web-based administration tool, and support for many more devices.

to post comments

OpenWrt 22.03.0 released

Posted Sep 6, 2022 12:48 UTC (Tue) by mranostay (guest, #89041) [Link]

Assuming "year-2032 readiness" is a typo of 2038

OpenWrt 22.03.0 released

Posted Sep 6, 2022 12:57 UTC (Tue) by intelfx (subscriber, #130118) [Link] (25 responses)

Nftables-based OpenWrt. I never thought this day would come.

Sadly all of fw3/fw4, netifd and UCI still is just a single giant leaking abstraction :-(

I would happily pay a premium for a _coherent_ RouterOS-style configuration interface built on top of OpenWRT or a similarly up-to-date Linux distribution. One can dream.

Quick straw poll...

Posted Sep 6, 2022 13:00 UTC (Tue) by intelfx (subscriber, #130118) [Link] (23 responses)

Dear hobbyist sysadmins of LWN, what software are you using for your networking needs?

Do you just accept and embrace OpenWRT? Or do you eschew specialized hardware&software and do everything by hand with generic Linux distros on generic Linux boxes? Or is it something else?

Quick straw poll...

Posted Sep 6, 2022 14:31 UTC (Tue) by Henning (subscriber, #37195) [Link]

Personally, for my home use, I've gone from propriatory routers to OpenWRT (starting on the classic Linksys WRT54GL) and I am now running Turris Omnia with the OpenWRT-variant they are using.
However, my next network gear will probably be my own build with a regular linux-distro since I cannot be bothered to re-learn the various tools and quirks used in OpenWRT or whatever specialized router OS I am using. I find it much easier to just configure it with the standard network-tools with a minimal install than having to figure out the layers above each time as soon as one wants to do something remotely specialized.

Quick straw poll...

Posted Sep 6, 2022 14:35 UTC (Tue) by bof (subscriber, #110741) [Link]

Professional sysadmin here (well, I get paid for it)...

I run my routing and filtering VMs with the same generic distro to load into memory what's needed, and provide packaging support, monitoring agents etc; the actual kernel + userlevel parts involved, I build / scripted and package myself.

Quick straw poll...

Posted Sep 6, 2022 15:01 UTC (Tue) by neggles (subscriber, #153254) [Link]

OpenWrt, VyOS, (MiktoTik) RouterOS; they’re all suited to different tasks. I just wishVyOS had even a basic webUI

Quick straw poll...

Posted Sep 6, 2022 15:04 UTC (Tue) by pLu (subscriber, #53933) [Link]

OPNsense for firewall, which has a convenient web UI, but OpenWrt on my AP.

Quick straw poll...

Posted Sep 6, 2022 15:28 UTC (Tue) by GhePeU (subscriber, #56133) [Link]

I used (virtualised instances of) OPNsense in a recent project because in this particular case I really needed a GUI, but if I have to do something more ad-hoc and/or complex (network namespaces, policy routing, complex firewall rules, remote logging of the conntrack table with ulogd2, BGP/OSPF, VPN setups, etc. etc.) I generally deploy a standard Linux distro.

With a limited amount of systemd drop-in files it doesn't take too much work to set up a system where every config file somebody may want to change is collected in a git-managed directory and a couple of scripts that call git and systemctl restart/renew are all that's needed to switch to a new configuration.

Quick straw poll...

Posted Sep 6, 2022 15:43 UTC (Tue) by Cyberax (✭ supporter ✭, #52523) [Link]

> Dear hobbyist sysadmins of LWN, what software are you using for your networking needs?

MikroTik RouterOS, although I want to switch to something else that supports DHCPv6.

Quick straw poll...

Posted Sep 6, 2022 18:49 UTC (Tue) by lutchann (subscriber, #8872) [Link]

The "big" router is just Ubuntu on a low-end Dell server, but all my APs and various smaller routers are OpenWRT. It's actually a pretty solid distro if you use the image builder to strip out LuCI and all the OpenWRT-specific firewall and other management stuff, and just configure everything in its native config file format.

Quick straw poll...

Posted Sep 6, 2022 18:50 UTC (Tue) by zdzichu (subscriber, #17118) [Link]

My router is just an x86 box running Fedora, since forever. It also doubles as my NAS, VM host and media station (it is connected to big screen in the living room and runs Kodi).

I have a WiFi access point, but it merely bridges wireless into home ethernet (DHCP, radv, firewalling, routing runs on Fedora machine). I will get rid of wifi ap as soon as I find cheap, sensible wifi6(e) card working with hostapd.

Quick straw poll...

Posted Sep 6, 2022 21:31 UTC (Tue) by julian67 (guest, #99845) [Link]

I like OpenWrt a lot. My ISP supplied modem/router was hopeless as the ISP had reserved port 443 for its own admin control of the devices they supply! No, really, they actually did that and you couldn't undo it. So I bought an old BT Home Hub 5 VDSL2 modem/router for very little and installed OpenWrt. It gives me 100% reliability and lets me apply reasonable firewall rules and do sane port mapping and port forwarding so I can run a few services from home. It's very nice to have a router which runs wireguard, so I can always connect to my LAN and use my home server's services as though I was there. I know many people will be doing all kinds of stuff with OpenWrt but I just needed a modem/router which works like you'd hope it would, which it turns out is about as common as the holy grail in the world of ISP supplied hardware. For non-expert home users projects like OpenWrt and Pi-Hole are a godsend.

Quick straw poll...

Posted Sep 7, 2022 3:14 UTC (Wed) by docontra (guest, #153758) [Link]

I'm in the same boat as bof (as far as job title goes):

At work I use OpenWRT on the APs[1], and I have one of my servers that acts as a NAT router for the service VMs. At home I use OpenWRT, with the router supplied by my ISP in "Modem" mode (no NAT, it hands a public IP to whatever manages to snatch it via DHCP first, which is always my AP). In both cases I don't use OpenWRT's dnsmasq as my DNS server (I run bind DNS in a service VM/Helios 4 respectively), and at home I also have DHCP handled in the Helios 4.

At work one of my most prized features of OpenWRT is its support for VLANs, which have allowed me to do some pretty nifty network segmentation (in conjunction with Managed L2 switches).

I've always tried to buy hardware compatible with OpenWRT (which has luckily been very easy since the early 2010s) and I've never had any real issues (even on TP-Link routers notorious for huge dnsmasq memory leaks on their factory firmware).

[1]: One AP has a public IP and does NAT/DHCP, the others act as bridges. My pie-in-the-sky dream is for a "big" (>= 48 port, or at least >= 24 port) L3 Switch, with non-stingy Flash (at least 64MB, preferably >= 128MB) capable of running OpenWRT (I've seen ports for some L2 switches, but none sold in my country).

Quick straw poll...

Posted Sep 7, 2022 6:16 UTC (Wed) by eduperez (guest, #11232) [Link]

Two off-the-shelf home routers (one acts as a router-on-steroids, the other as a not-so-dumb access point), both running OpenWrt.

Quick straw poll...

Posted Sep 7, 2022 13:50 UTC (Wed) by somlo (subscriber, #92421) [Link] (6 responses)

Kept the verizon fios router (because cable boxes rely on it). turned off the wifi, and hooked up an OpenWRT netgear router to the "south" of it, which supports my wifi and wired LAN. Suboptimal due to double-NAT, but works well enough in practice. I have some creative port forwarding rules (through both boxes) to be able to reach my workstation from the "outside" in an emergency.

I used to care a whole lot more (built my own wifi-enabled router on a soekris board some decade(s) ago), but eventually fatigue caught up with me, and as long as verizon doesn't get to snoop around in my internal LAN, I'm mostly content... :)

Quick straw poll...

Posted Sep 7, 2022 14:54 UTC (Wed) by mathstuf (subscriber, #69389) [Link] (5 responses)

> Suboptimal due to double-NAT, but works well enough in practice.

At this point it really seems like Wireguard is a better solution for getting access to my inner network than faffing about with firewall rules…

Quick straw poll...

Posted Sep 7, 2022 15:21 UTC (Wed) by somlo (subscriber, #92421) [Link] (3 responses)

> At this point it really seems like Wireguard is a better solution...

I assume that would require one to have access to (control over?) a gateway node with a publicly routable IP to set up a tunnel from one's inner network, and to use as a relay to connect *into* said inner network from the outside.

A reasonable tradeoff compared to tracking one's ISP router's public dhcp address as it (rarely, but reliably) gets re-assigned (after e.g. a power outage), and connecting to it from the outside when needed (the forwarding rules don't need any adjustment if set up correctly).

Quick straw poll...

Posted Sep 7, 2022 15:33 UTC (Wed) by mathstuf (subscriber, #69389) [Link]

I already have a VM in the cloud, so it's not too much to add the gateway node there. AFAIK, the "commercial VPNs" that deploy WG work fine for those without a cloud/DNS presence (Tailscale?).

Quick straw poll...

Posted Sep 8, 2022 2:38 UTC (Thu) by pabs (subscriber, #43278) [Link]

Tor onion services are a good way to connect to machines behind NAT, or there are lots of commercial services that provide that sort of thing, some of them with FOSS client software, others without.

Quick straw poll...

Posted Sep 9, 2022 0:54 UTC (Fri) by flussence (guest, #85566) [Link]

I've got this setup myself, here's what I ended up doing:

The outer router has RIP2M turned on (one of the few useful things it does), the inner router runs bird and automatically maintains two kernel routes to the IPs both ends of the PPP connection. When those routes change or expire I have a script do a UPnP query for the correct address (slow and flaky, so I can't just poll using this method) and then it goes off and updates a dynamic DNS pointer with the result.

That sounds like a whole lot of busywork (it sure is!), but it does mean I don't have to rely on an external IP address checker service and I get pinged instantly at home when there's a problem. It recovers from power outages, line disconnects and ISP DHCP expiry with at most 2-3 minutes of lag provided everything else is up and running. Room for improvement on that number, but I'm not winning any medals for going fast.

WireGuard on top makes most of this transparent, to the point where I didn't even realise I had an outage last week until cron sent my phone an angry email.

Quick straw poll...

Posted Sep 9, 2022 0:19 UTC (Fri) by julian67 (guest, #99845) [Link]

Yes, it really is. Wireguard on OpenWrt (or any good router OS I guess) is excellent. I used to use OpenVPN and then Strongswan. They were hugely complex to configure and in real world situations were frustrating to use (or try to use). Version updates could render them useless until fascinating but unwanted new issues were identified and dealt with. Wireguard has really taken the pain out of config and the unreliability out of usage. My clients are Android (phone and tablet) and also an ancient Lenovo Thinkpad which dual boots Win 10 and Debian Testing. It all works, has worked for ages, survives huge updates of wg and OS, and continues to work (fingers crossed and I hope I didn't just curse my luck).

Quick straw poll...

Posted Sep 7, 2022 15:07 UTC (Wed) by eliezert (subscriber, #35757) [Link]

ISP's router is crappy (as in default pasword is the last bytes of the MAC address) and costs $20 a month.
Got a TPlink router that is on the HW support list and now I have all the features I always wanted:
Kids are on their own separated network.
DNS resolves DHCP names
Let's encrypt just works
the list goes on

Quick straw poll...

Posted Sep 8, 2022 6:06 UTC (Thu) by nilsmeyer (guest, #122604) [Link]

Have been using OpenWRT on x86 hardware (Atom x6425RE and Pentium N6005) for a while, however I'm going to switch to plain Ubuntu soon since this gives me a larger selection of software and ties in better with my suite of ansible scripts. It's a pit of a pain to get things like PPPoE (required for German ISPs) and prefix delegation working on regular Linux distros though.

Quick straw poll...

Posted Sep 8, 2022 23:18 UTC (Thu) by flussence (guest, #85566) [Link]

> Do you just accept and embrace OpenWRT? Or do you eschew specialized hardware&software and do everything by hand with generic Linux distros on generic Linux boxes? Or is it something else?

Option 2, but I kind of got pushed down that route.

My ISP-facing outer wall is a Netgear I found in the trash - worth what I paid for it, frankly - with every possible feature turned off and only functioning as a NAT gateway and modem. I used to have an even older one that I successfully installed OpenWRT on, but it wouldn't sync above 8Mbit. I've got a drawer full of various models (apparently other users of my ISP are dissatisfied with the junk they keep getting sold too) but none of them have useful OpenWRT support and I've bricked a few in trying.

My real router is a normal Linux box on my LAN with a messy hand-rolled nftables setup (tidying it up has become a Forever Project, it'd be much easier if I didn't have to fight nft's parser every step of the way) and everything is shunted through tc-cake, which works amazingly well despite the middlebox.

Quick straw poll...

Posted Sep 14, 2022 20:51 UTC (Wed) by ssmith32 (subscriber, #72404) [Link]

Off the shelf netgear nighthawk routers + ddwrt. Pretty basic setup, but the repeater functionality lets me use old routers for coverage instead of shelling out for some +$500 meshy stuff.

Quick straw poll...

Posted Sep 16, 2022 18:37 UTC (Fri) by bartoc (guest, #124262) [Link]

Using openWRT right now, but considering switching back to Netgear's firmware as it supports automatic updates and upnp works (upnp seems to have been broken in OpenWRT for a few years, at least for my configuration). Also getting the flow offloading on my router CPU to work with OpenWRT is a pain and I really need that or my router can't keep up with my connection.

I am considering switching to one of the intel atom (Denverton or Elkhart/Apollo Lake) based "uCPE" rotuters running vyOS

OpenWrt 22.03.0 released

Posted Sep 7, 2022 17:30 UTC (Wed) by Elv13 (subscriber, #106198) [Link]

I wrote my own toy router OS and have been using it for 5 years. It's using a Lua code file stored in Git as UI/config and generate OCI images to be executed on-device by podman or systemd. https://github.com/Elv13/reclaimail/blob/master/docker-ro... .

I am/was holding until bpftable was mainlined (it was soon, they said...) before writing a firewall module. The main reason I did that was because I needed a PXE implementation that didn't suck to generate bootloader config for my SIP phone ans RPis. That software stack isn't super useful for other people in its current shape. It relies on unmergeable patches to DNSmasq (which mean I have to package CVE patches all the time). The version on GitHub is also probably a bit broken. I got a better one locally (needs cleanup before posting). If interested, fill an issue there. The newer variant also keep the "brain" in its own container and DNSmasq in a microVM container.


Copyright © 2022, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds