NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Morganino
Jun 26, 2017Tutor
Netgear R7000 and OpenVPN for Android App
Hi, since last OpenVPN for Android App update (v.0.6.73) downloadable at the following link: https://play.google.com/store/apps/details?id=de.blinkt.openvpn OpenSSL version was upgraded to 1.1 and...
- Feb 28, 2018
Thanks everyone for feedback so far. Attached is version 1.0.1. I fixed some typos, added a suggestion to clean up your tftp folder when you're done, and made a note about the OpenVPN version that's most compatible with the document.
Some users looking to work through this doc may find that they can avoid Step 1 by visiting this hidden page:
If the debug page loads and there is an "Enable Telnet" option then you got lucky. Note that either the debug page or the option to "Enable Telnet" may not exist on your device or firmware version. Remember to check that this option is disabled after you're finished because having telnet enabled is a security risk.
NG_Guru
Feb 25, 2018Star
I can confirm that step 1 can be avoided (R8500) by going to http://192.168.1.1/debug.htm and select "Enable Telnet "
Can anyone else confirm that telnet can be enabled this way ?
Frankyvee
Apr 13, 2018Guide
However it does not appear that the R7000 model has enable the "Telenet" feature on the debug page. :-(
NG_Guru wrote:I can confirm that step 1 can be avoided (R8500) by going to http://192.168.1.1/debug.htm and select "Enable Telnet "
Can anyone else confirm that telnet can be enabled this way ?
- pthorvaldApr 16, 2018Guide
Has anyone heard from Netgear lately? The deadline is approaching fast.
Assuming they do release a fix, it will be interesting to see what they do.
- What level protection will it provide?- Will it break the fix that this thread supples (I would guess it will)
- How hard will it be to put the keys we developed with this fix back on the router. (I don't want to have to distribute keys again)
I am half tempted to not install new fixes from Netgear..... but there are other security fixes that would be foolish to ignore.
Once again my thanks go out to Diggie3 for the fantastic work he did in figuring out a solution and documenting it so well.
- pthorvaldApr 28, 2018Guide
The silence from Netgear is ominous.
- NG_GuruApr 28, 2018StarHere is why you’ll never get anywhere with NG. Read the box that your router came in: “Netgear makes no representations or warranties about this product’s compatibility with future standards.”
Sounds like they don’t “have” to fix anything. And we sure don’t have to buy any future products from them. - pthorvaldApr 28, 2018Guide
Almost all companies have that type of disclaimer. Their lawyers insist on it.
Many (most?) reputable companies still try to take care of things like this, particularly if it is an advertised feature.... they don't want to get a bad rep.
However, as you say, we don't have to buy from them and if they don't fix this I will no longer be a customer of theirs because they will have lost my trust. More importantly, I will be doing reviews of the product wherever I can so others find out about the lack of support for an advertised feature. (An important part of capitalisim is having a well informed customer.... so I will help inform other customers of my personal experience)
Having said that, I still hope Netgear comes through.
- katsawApr 29, 2018Guide
So disappointed! This is the way NG to server customer!
I have the situation worse than yours because R6220 can’t use the method mentioned by this post.
- stereopticMay 01, 2018Tutor
So, it looks like the certificates have been changed to SHA256:
https://kb.netgear.com/000057097/R7000-Firmware-Version-1-0-9-30-Hot-Fix
I'm not sure what settings will be changed, they suggest to make a record of everything before doing the upgrade.
- katsawMay 01, 2018Guide
stereoptic wrote:
So, it looks like the certificates have been changed to SHA256:
https://kb.netgear.com/000057097/R7000-Firmware-Version-1-0-9-30-Hot-Fix
I'm not sure what settings will be changed, they suggest to make a record of everything before doing the upgrade.
Congratulations to R7000 users, it seems NG completing the OpenVPN update for MD5 security issue:
New Features and Enhancements:
- OpenVPN cert update (from MD5 to SHA256)
Does that mean the new certificate must be generated after firmware upgrade?
- pthorvaldMay 01, 2018Guide
First: A thanks to NG for comming through with a fix.
> Does that mean the new certificate must be generated after firmware upgrade?
I have not tried the fix yet. However, my guess after the update we will have to export the keys and deploy them to our devices just like we did originally.
If anyone gets a chance to look under the covers of what they implimented I would be interested in learning what you find. (I won't be able to look for a week or so) I am guessing they are using the same keys for everyone (just like before). Consequently I am hoping I can go back in and put the keys that Diggie3 showed us how to generate back in. (This will also save me from having to distribute keys again)
- 96708May 01, 2018Apprentice
Can you elaborate on what you mean by same keys for everyone?
- pthorvaldMay 01, 2018Guide
96708 wrote:
Can you elaborate on what you mean by same keys for everyone?
From what I have read on this and other NG Forum threads, it sounds like the router does not generate keys. Instead they ship with a set of keys (The same for every router). If anyone else on the thread has a more definitive explination, please chime in.
- katsawMay 01, 2018Guide
pthorvald wrote:
96708 wrote:
Can you elaborate on what you mean by same keys for everyone?
From what I have read on this and other NG Forum threads, it sounds like the router does not generate keys. Instead they ship with a set of keys (The same for every router). If anyone else on the thread has a more definitive explination, please chime in.
No, this is not exactly you mentioned.
In the past, Netgear router’s OpenVPN key/certificate was downloaded from router’s firmware setup page and stored to either PC or Mobile phones. However, the key/certificate will never change no matter the router is “Reset” or even firmware upgraded. That means, if someone had got the key/certificate before you can never stop him/her from connecting to your OpenVPN in the future.
- katsawMay 01, 2018Guide
pthorvald wrote:
First: A thanks to NG for comming through with a fix.
> Does that mean the new certificate must be generated after firmware upgrade?
I have not tried the fix yet. However, my guess after the update we will have to export the keys and deploy them to our devices just like we did originally.
If anyone gets a chance to look under the covers of what they implimented I would be interested in learning what you find. (I won't be able to look for a week or so) I am guessing they are using the same keys for everyone (just like before). Consequently I am hoping I can go back in and put the keys that Diggie3 showed us how to generate back in. (This will also save me from having to distribute keys again)
I am afraid that Diggie3‘s method no longer valid after this new firmware upgrade. I hope somebody can tell if Diggie’s method can still work with this new firmware version.
- Diggie3May 01, 2018LuminaryHi all,
Unfortunately I have been absolutely slammed with work for some time, working nights and weekends, and I haven't had a chance to work on the VPN issue lately. I am glad people were able to update their certs and help one another around some issues.
I don't expect to be able to try the beta before the weekend at least. Just putting that out there in case anyone was waiting for a comment from me. - pthorvaldMay 01, 2018Guide
Diggie3 wrote:
Hi all,
Unfortunately I have been absolutely slammed with work for some time, working nights and weekends, and I haven't had a chance to work on the VPN issue lately. I am glad people were able to update their certs and help one another around some issues.
I don't expect to be able to try the beta before the weekend at least. Just putting that out there in case anyone was waiting for a comment from me.Diggie3, you are a rock star!!!! You have already done more than any of us could have hopped for.
- stereopticMay 01, 2018Tutor
Based upon what I am reading here about the certificates not being unique, I think that your solution is much more secure!
Before I purchased this router, I had built my own VPN using these instructions:
Build a Smart Raspberry Pi VPN Server: Auto Configuring, Plug-n-Play, Use from Anywhere (3rd Edition, Rev 2.0)
- Diggie3May 01, 2018LuminaryRegarding certificate uniqueness,
Modern NG routers, like the R7000, should have unique certificates*, with the main downside being that you only get one client certificate to share among all your clients. Fortunately we at least have manual steps to replace that cert if need.
*Caveat: I haven't checked the beta myself yet but I assume they're not doing anything stupid.
Older generation routers where you can't replace the certs: I would recommend not to use OpenVPN server on them.