Page 1 of 2
NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 11:39 am
by normis
BTH provides easy VPN to your router, even if you are behind NAT. Main use - take the phone app and enable the new feature, then connect to your home network, while abroad or anywhere.
In the background it takes care of all the configuration in the router, makes a Wireguard setup, configures the firewall, communicates with our cloud.
Then use the same phone app to go "back to home" when you are away. Use internet through your home network, to have pihole block ads, or just to change your IP and watch content only available "back home".
In case your router is behind NAT, somewhere inside a private network, the connection will be made though our relay servers.
Feature is in BETA (Gradual rollout to see what our relays are capable of, to slowly test load) and is currently available on ARM/ARM64/TILE.
Apple iPhone:
https://apps.apple.com/lv/app/mikrotik- ... 6450679198
Android:
https://play.google.com/store/apps/deta ... id.freevpn
Manual with more info:
https://help.mikrotik.com/docs/display/ROS/Back+To+Home
Available from 7.11 (currently in RC)
Please test it and report any issues.
Re: Back to Home VPN
Posted: Mon Jul 31, 2023 11:40 am
by normis
DNS should be your home ISP DNS or any public DNS like 1.1.1.1
Re: Back to Home VPN
Posted: Mon Jul 31, 2023 11:44 am
by normis
Answers to common questions:
1) It uses Wireguard and is a secure VPN
2) (If used) Relay does not decrypt your tunnel and has no access to your data
3) It secures your router with firewall, it does not open up full access to your router in any way
4) It is not a feature for anonymity, it is a home user feature for maximum ease of use.
5) If you wish, after you have enabled it with our BTH app, you can also connect using Wireguard on your computer. You can use the QR code in Winbox IP CLOUD menu to get the needed config to your computer
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 12:43 pm
by rplant
Hi,
Could you perhaps consider making a NAT helper for routerOS, that would make a router act as a relay like your BTH relay.
That can be applied to a small number of UDP ports.
Some maybe simplifications.
Server connects via one port clients connect via another port. (does this make it simpler?)
Only on devices with good amount of flash.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 12:46 pm
by normis
What would be the use case, sorry I don't get it
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 1:05 pm
by ToTheFull
Silly question, but is it safe to just use the wireguard app with the QR code as I already installed that on the other-halves phone which seems to work ok but took ages to connect? Android by the way.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 1:24 pm
by normis
Of course you can just keep using Wireguard. This new feature is also using Wireguard, but it has one advantage, it can work even if your router has no public IP
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 1:31 pm
by ToTheFull
Of course you can just keep using Wireguard. This new feature is also using Wireguard, but it has one advantage, it can work even if your router has no public IP
Thanks for the further info. Great feature by the way!
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 1:45 pm
by freemannnn
will ever be support for mipsbe devices?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 1:56 pm
by krafg
As always mipsbe and mmips are forgotten. :(
For now my only alternative is using Raspberry Pi and/or x86 machines with some Linux.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 3:23 pm
by Jotne
Will Back to Home also come on Mipsle devices? Wireguard does work fine on mipsel router, so it should not be a big change to make it work.
However, if the router is not directly reachable from the internet, the connection will be made through the MikroTik relay server
Any information on the relay server? Capacity? Where are they located? Will there be server on other countries?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 4:10 pm
by normis
Apple iPhone version released (but some updates coming soon):
https://apps.apple.com/lv/app/mikrotik- ... 6450679198
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 5:03 pm
by massinia
If the router has no public ip (4G connection) all traffic goes through MikroTik servers, am I right?
If yes, are there any speed or traffic limits?
Or does it work as a ZeroTier relay?
Thanks
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 5:15 pm
by normis
Yes that's true. Currently there are no limits. It might change in the future, but there is no plan for that at the moment.
If we run into traffic problems, we will just add more relays around the world.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 5:45 pm
by Amm0
Did quick test if iOS app. Seems to work, at least against two different router, using LTE/CGNAT on device with BTH iOS app.
Was able to connect to a BTH-enabled router with public IP. And was also able to connect using relay with a host behind a CGNAT address e.g. remote end also uses LTE, so BOTH ends behind a CGNAT – this later case isn't possible with WG alone without the BTH relay (or using ZeroTier).
Although latency is pretty bad if relayed, things do route/connect. I see ping times in the 600-800ms range using BTH with relay from phone to router. This router also has ZeroTier, so if disconnect from BTH and use ZT as VPN instead, latency is about 150-250ms in same ping test. I'd imagine difference is ZT roots are closer than Latvia...not that ZeroTier is inherently faster, just way closer in proximity to California.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 5:49 pm
by Amm0
Can we get answer on the xMIPSx situation with BTH?
That really is where BTH be more useful. e.g. I used ZeroTier to enable BTH to test it – so really didn't need BTH since I already had ZeroTier. On xMIPSx, there are no options for a VPN from a CGNAT to a CGNAT, without building your own VPN hub.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 6:25 pm
by ksteink
Nice feature specially for the ones that are stuck with CGNAT!!!. I like to see as a feature virtual stacking for CRS switches (CRS3xx and CRS5xx) for HA core Switches!
Keep it going!
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 7:19 pm
by JoshDi
@normis - great feature!
Two questions:
Is it possible to open source/release the server side of the BTH relay? I'd love the ability to roll my own relay - which would remove the traffic from going through Mikrotik's server (would save Mikrotik cost as well)
Where are the relays currently located?
thank you!
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 7:30 pm
by normis
While in Beta, we have a relay in the MikroTik data center in Latvia. Depending on demand, we will expand to other regions and will lauch relays in other countries. If somebody here works in a well connected data center with high speed connectivity, you are welcome to drop us an email
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 7:31 pm
by eworm
Is it possible to open source/release the server side of the BTH relay? I'd love the ability to roll my own relay - which would remove the traffic from going through Mikrotik's server (would save Mikrotik cost as well)
Why? Instead of a relay you could just run a Wireguard server with public IP address. The point of the relay is that Mikrotik is not able to decrypt your traffic - you do not need traffic for yourself, do you? 😜
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 7:36 pm
by normis
Exactly. If you can run a relay, you basically don't need a relay.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 7:56 pm
by R1CH
Why use a full relay and not STUN? Wireguard runs over UDP so hole punching should work fine with a short enough keepalive.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 8:18 pm
by holvoetn
If somebody here works in a well connected data center with high speed connectivity, you are welcome to drop us an email
Our own TomJonesNorthIdaho comes to mind...
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 8:32 pm
by Amm0
Is it possible to open source/release the server side of the BTH relay? I'd love the ability to roll my own relay [...]
Why? Instead of a relay you could just run a Wireguard server with public IP address. [...]
That's actually nice part. Any peer will directly connect to the router's WG from BTH app (or any WG client) if you have a public IP on router, automatically.
If there is not a public IP (e.g. some dual WAN that failover to LTE, or other routing change, etc.) ... the nifty part is nothing in the client configuration changes, except then it traffic be proxied if the router with BTN does NOT have public IP detected.
Only requirement is using Mikrotik DDNS...since that's critical to how this work: if you resolve the <sn>.vpn.mynetname.com address shown in winbox/CLI, you'll can see that's it's your own public IP (if direct) OR a Mikrotik IP (if proxied)... Also means if your WAN IP changes, it take DNS TTL and /ip/cloud DDNS update interval for it to "switch" between proxy and direct...
So if you have public IP and BTH... the only dependency is on Mikrotik DDNS but otherwise it's normal WG peer connection.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 10:08 pm
by zandhaas
When using the standard Wireguard Iphone App I am able to connect.At the moment I can not find the Mikrotik BTH Iphone app in the app store (I'm living in the Netherlands)
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 10:30 pm
by krafg
Can we get answer on the xMIPSx situation with BTH?
That really is where BTH be more useful. e.g. I used ZeroTier to enable BTH to test it – so really didn't need BTH since I already had ZeroTier. On xMIPSx, there are no options for a VPN from a CGNAT to a CGNAT, without building your own VPN hub.
Probably never will be supported, so, Wireguard apparently not supports MIPS architecture. Probably I'm wrong.
On past I used ZeroTier and Tailscale on Windows and Linux machines but sometimes some machines randomly lost the connection or never connects at machine's startup. So I decided to implement Twingate on my Raspberry Pi 4 under Debian Minimal and worked really well.
A bit detail yesterday I decided to upgrade all system and stupidly reboot and now I can't access to my devices, and now I'm not at home until this Wednesday.
I think that ends to a kernel panic probably or another boot problem, so on my windows server I will create a VM with some Linux minimal (probably CentOS Stream) to create a "copy" that can works as backup.
You know another VPN solutions? I'm also using on both sides LTE with CGNAT on both sides of course. My home core is LtAP (mmips).
Regards.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 10:47 pm
by Jotne
Wireguard apparently not supports MIPS architecture. Probably I'm wrong.
There you are wrong. Wireguard works fine on the RB750g3 Mipsel.
.
WireGuard.png
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 10:52 pm
by holvoetn
Wireguard works fine on the RB750g3 Mipsel.
Quite true.
Hex (MMIPS) was my first Tik and the very first I used Wireguard on, already with first beta of ROS7.
Also on Map and mAP Lite (MIPSBE, 2nd and 3th Tik
) it works just fine.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 10:56 pm
by krafg
Oh, thanks for clarification Jotne and holvoetn, so, only waiting for BTH compatible with MIPS.
Regards.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 11:16 pm
by Amm0
You know another VPN solutions? I'm also using on both sides LTE with CGNAT on both sides of course. My home core is LtAP (mmips).
Not really. I have to use LTE with public IPs, but that's not always possible & expensive. So use SSTP as backup, but that takes another router to act as the relay (at some point could use normal WG, but still some lingering V6 devices)...
[...] only waiting for BTH compatible with MIPS.
Yup, as BTH be fine a solution (in my initial testing on a remote wAPacR) for the CGNAT problem on LtAP (and KNOTs) without ZT... e.g. there are 0 devices with 2 modems in the ARM lineup... Why do you think I've resorted to begging here?
Since BTH is really just some UI/CLI around WG client config & another DDNS update, at least on the RouterOS side.... I don't see how BTH be an intensive feature on [CPU limited] xMIPSx platforms — at least no more so than standard WG [which is supported, as noted above].
I can see xMIPSx may not be the first platform for a beta. Just some clarity here is all I'm asking... Since I just need remote access to routers behind a CGNAT, I really don't care if ZT or BTH+WG – different but either work behind CGNAT...
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jul 31, 2023 11:36 pm
by krafg
Thanks for response.
We wait...
Regards.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 1:34 am
by rplant
What would be the use case, sorry I don't get it
Similar use case to using your Relay Except closer to home.
I have a CHR in a nearby data centre, and currently use a wireguard in wireguard tunnel to get back to home (CGNAT) with e2e encryption.
It is not ideal on a number of points, but still brisk, and quite low latency.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 8:38 am
by normis
You can already make a Wireguard connection to your CHR from the home router, and then make a Wireguard VPN from your phone to the same CHR. This way you can achieve the same result without custom "relay".
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 8:41 am
by normis
When using the standard Wireguard Iphone App I am able to connect.At the moment I can not find the Mikrotik BTH Iphone app in the app store (I'm living in the Netherlands)
did you try the direct link?
https://apps.apple.com/lv/app/mikrotik- ... 6450679198
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 8:56 am
by zandhaas
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 10:25 am
by Gennadiy51
A huge request to you, please make a video on this topic.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 1:15 pm
by nichky
nice work!
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 2:18 pm
by krafg
You can already make a Wireguard connection to your CHR from the home router, and then make a Wireguard VPN from your phone to the same CHR. This way you can achieve the same result without custom "relay".
I can't open any port on my home router and always I get 10.x.x.x IP segment from my ISP. Anyway I can do that?
Regards.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 3:05 pm
by normis
not to your home. FROM your home. that's the idea
Phone ------> [CHR server] <------- Home behind NAT
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 3:24 pm
by baragoon
Thanks, but we need xMIPSx devices support :'(
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 5:26 pm
by krafg
not to your home. FROM your home. that's the idea
Phone ------> [CHR server] <------- Home behind NAT
And there are some free service to alocate CHR on cloud that can recommend?
Thanks and regards.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 6:52 pm
by Amm0
not to your home. FROM your home. that's the idea
Phone ------> [CHR server] <------- Home behind NAT
And there are some free service to alocate CHR on cloud that can recommend?
Another workaround for lack of BTH on MIPS... is using VPN (WG or whatever) on IPv6. This depends on the LTE provider with CGNAT, but good chance they support IPv6. No middle CHR need if both sides have IPv6.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 8:53 pm
by krafg
True, but in my case none of ISP's of my country provides IPv6 address for LTE. Anyway for people that applies this, it can helps. Good point.
Regards.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 9:49 pm
by templeos
Can you fix the hexagons background image in the Android app? It looks stretched compared to the iOS version.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 01, 2023 10:47 pm
by Amm0
well, if we're going to be picky... on iOS BTH app
- it should start with the username/password scene if there no/0 tunnels setup (e.g. fresh install) - the "add" step is unneeded in most basic use case
- if you have the Mikrotik app with saved passwords, it be nice if the BTH used/access those (or y'all just used the keychain)
- if you click the name of the tunnel, that's what should expend the selector shown at bottom
- ... similarly perhaps a gear icon or something at bottom, so to the tunnel selector tab at bottom isn't always shown (e.g. make UI look more complex if there is only simple "single router home" case).
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Aug 02, 2023 8:20 am
by Jotne
I take the silence from MT about "Back to Home" on mips some like this:
* We can get it to work, but we like to phase out the mips series, so it will not be supporter.
* We have problem to get it to work, so we wait to inform about status for mips until we have a good answer to give.
Should not be hard to implement since Wireguard works fine today on mips devices.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 04, 2023 9:22 am
by satman1w
Excellent idea, but... QR code is huge and unreadable...
I have managed to read the QR code only after importing hashes from screen dump to excel, and replacing them with black or white squares..
can you make it smaller to fit the screen or exportable somehow?
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 04, 2023 10:50 am
by Kanzler
@satman1w, Are you sure you're using the latest version of Winbox(3.39)?
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 04, 2023 2:12 pm
by nonolk
Hello everyone,
@Normis, the application is still not available in France on IOS, searching for it gives no results, and using the direct link says « this application is not available in your country ». I don’t think it’s wished.
Regards,
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 04, 2023 9:58 pm
by gigabyte091
Did anybody tried to play with site to site configuration ?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 5:55 am
by fqx
there was an application called Tailscale.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 8:53 am
by normis
Hello everyone,
@Normis, the application is still not available in France on IOS, searching for it gives no results, and using the direct link says « this application is not available in your country ». I don’t think it’s wished.
Regards,
It does find it for me, if you search for MikroTik, but it's below some other results. So use the link
https://apps.apple.com/lv/app/mikrotik- ... 6450679198
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 9:22 am
by Amm0
Maybe Apple has additional requirements for France App Store? Between Apple and France... easy to imagine might be some additional paperwork... ;)
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 9:26 am
by normis
Sorry, update about France. It looks like France is banning encryption apps, so this is why we could not release it there. They require special approval from the government to release app that encrypts data.
https://www.ssi.gouv.fr/en/regulation/c ... pplication
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 10:10 am
by rextended
Are
we kidding?
They are ridiculous.
If they do it for terrorism, imagine if blocking the app in the store prevents criminals from installing it anyway, or evidently using even safer alternative means...
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 11:05 am
by nonolk
@Normis, I think you miss interpreted this rule, because It apply to cryptography solution(new systems, new cyphers….), and even more it seems only to apply when you are selling something, I.posting or exporting goods…. Otherwise even selling routers, switches with vpn technology should also require it.
Other example, wireguard, openvpn and so on also have their own apps present in the AppStore… so there I don’t see any valuable reason
IMG_0013.jpeg
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 11:35 am
by normis
It was request from Apple to submit that paper
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 11:40 am
by nonolk
@Normis, so here it’s just a miss understanding from their side…
I will try to use my US account to get it
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 11:47 am
by normis
I tried to submit appeal. Try again in a moment.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 1:02 pm
by nonolk
@Normis, ok just tell me when to try ;-) But I know that it could take a while to make Apple change their mind.
Anyway thank you for your answer and great work.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 2:04 pm
by normis
try now
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 2:38 pm
by nonolk
@Normis it is available now… thank you
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 3:23 pm
by Josephny
I've been holding my breath waiting for BTH to be available on mmips and I'm about to pass out.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 4:38 pm
by Amm0
I take the silence from MT about "Back to Home" on mips some like this:
* We can get it to work, but we like to phase out the mips series, so it will not be supporter.
* We have problem to get it to work, so we wait to inform about status for mips until we have a good answer to give.
Well, can't blame Apple or French regulations on the MIPS topic...
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 9:53 pm
by krafg
So, why you made great devices like LtAP or LtAP mini with MIPS architecture instead of ARM? There is a plan to launch something like it with ARM architecture?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Aug 07, 2023 11:03 pm
by HACKFRAUD
Does it work when admin nazis block all udp ports?
I was trying to connect to home LAN using Wireguard once on public wifi in Bratislava, everything was blocked.
I was able to connect using Wireguard from a plane flying over USA, its a great vpn with fast speeds.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 2:51 am
by Amm0
Does it work when admin nazis block all udp ports?
I don't think so... it's still WG under-the-covers. But ZeroTier should support TCP fallback if a NAT-punching VPN is needed as an alternative when faced with a "ZeroUDP" network .
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 6:15 am
by nichky
i wish if i can do that with laptop
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 8:05 am
by antonsb
i wish if i can do that with laptop
You can. Configure it as regular wireguard on PC.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 9:04 am
by satman1w
@satman1w, Are you sure you're using the latest version of Winbox(3.39)?
Now, I do..
:-D
and it looks much better
:-D
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 9:45 am
by nichky
You can. Configure it as regular wireguard on PC.
i was thinking to use the fancy way of back-to-home, but still i can use your CHR server without opening port on my Main Router, which is great
Thanks @antonsb!
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 9:46 am
by normis
You can. Winbox BTH menu shows the code to copy into your Wireguard app on your PC (also a QR code). It will use the fancy BTH when you do, so it will work behind NAT too, even if you don't use BTH app in your phone.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 2:42 pm
by anav
Okay, so what we have here is a way to connect back to the router using any device remotely, via the Mikrotik provided cloud ( third party substitute inbound ).
Assuming this is for access to the config but could be used to access subnets? Will play today.
Assuming this makes it easier than what I have already done EONS ago which is setup a wireguard connection on my iphone to the router directly and then using the wireguard APP to access my router etc......... ( Assuming the new app blends the two into one process ? )
The main difference is the MT Cloud removes anyone from not being able to access their router due to CGNAT, non-public IP, no access to port forward on upstream router!!!
IF so, a BIG THANKS to MT, for making themselves a relay server.
Almost as generous as zerotrust cloudflare tunnel for hosting servers without exposing public IP, coming to all mikrotik devices, from a smarter MT, in a parallel universe. :-)
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 2:43 pm
by normis
It is the same wireguard, just smarter - because if your home router is on private IP, it still works.
MikroTik relay is only involved in this case. IF you have public IP, it's just a direct wireguard, no relay.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 5:55 pm
by Amm0
IF so, a BIG THANKS to MT, for making themselves a relay server.
Almost as generous as zerotrust cloudflare tunnel for hosting servers without exposing public IP, coming to all mikrotik devices, from a smarter MT, in a parallel universe. :-)
There room for more tabs in IP>Cloud for other future proxies ;) ... just not for poor LtAP and KNOT owners that would really benefit from BTH...
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 8:29 pm
by anuser
Dreaming of an easy solution for our xx.xxx students:
- Back To Home
- Shibboleth login
- Full IPv4 + IPv6 dual stack tunnel after connect
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 9:00 pm
by own3r1138
MikroTik relay is only involved in this case. IF you have public IP, it's just a direct wireguard, no relay.
I have a valid dynamic IP which is obtained via PPPOE. However, BTH didn't have a direct IPv4 connection.
2023-08-08_02-26-21.jpg
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 08, 2023 9:27 pm
by Amm0
Dreaming of an easy solution for our xx.xxx students:
- Back To Home
- Shibboleth login
- Full IPv4 + IPv6 dual stack tunnel after connect
Interesting idea...
Yeah Mikrotik BTH app uses the local router to authenticate someone, which then gets the peer's WG config using some RouterOS API. So not far off. [ Maybe sooner than xMIPSx ]
Getting WG creds — without some manual key exchange process — is something BTH app does that's seems really helpful if you wanted to use WG at scale. It may not be fully appeciated here that BTH app does not need QR code, or providing someone keys. Only the standard WG app need(/likes) the QR. Instead, the BTH app essential turns a RouterOS username/password into a configured WG peer (*if port allowed to Mikrotik & user creds valid). e.g. none of the problems with how to get WG peer's key to someone...
The issue I suspect is BTH require at least "write" policy on the router (e.g. "BTH" is NOT a policy AFAIK). I'd imagine BTH authentication goes though RADIUS since BTH seemingly uses winbox login (but dunno, didn't test). But some policy to allow control BTH peer creation via RADIUS get you pretty close to SAML/SibbolethSSO since WG supports IPv6 already. Ideal being the BTH app could be used by your student's to create the WG to your network... indirectly, using BTH auth->RouterOS->RADIUS->SAML = WG-peer on phone.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Aug 09, 2023 7:51 am
by normis
MikroTik relay is only involved in this case. IF you have public IP, it's just a direct wireguard, no relay.
I have a valid dynamic IP which is obtained via PPPOE. However, BTH didn't have a direct IPv4 connection.
2023-08-08_02-26-21.jpg
Apparently it was not possible to connect to it, maybe ISP blocking something
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Aug 09, 2023 2:53 pm
by own3r1138
I have a valid dynamic IP which is obtained via PPPOE. However, BTH didn't have a direct IPv4 connection.
2023-08-08_02-26-21.jpg
Apparently it was not possible to connect to it, maybe ISP blocking something
Well, I use the main WG tunnel daily. Does the BTH check the tunnel connectivity from your server? Because Wireguard to/from outside my region is blocked.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 15, 2023 3:53 pm
by mtiksense
"Available from 7.11 (currently in RC)"
Mikrotik RB4011iGS+5HacQ2HnD-IN stable ROS 7.11 he didn't get an option Back to Home VPN.
??
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 15, 2023 3:57 pm
by ToTheFull
"Available from 7.11 (currently in RC)"
Mikrotik RB4011iGS+5HacQ2HnD-IN stable ROS 7.11 he didn't get an option Back to Home VPN.
??
They had a change of heart!
viewtopic.php?t=198228#p1018758
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 15, 2023 4:34 pm
by Amm0
I think if you had the configuration from the 7.11rc...and upgrade to 7.11stable, it keeps the configuration at least. Or at least that's what I see.
So I don't think it breaks for previous beta users — since it really just create the config needed for WG, the peers remain after upgrade.
Now since UI is not stable build, you cannot enable it, or setup a new BTH peers – until 7.12beta comes out (if my reading MT's post right).
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 15, 2023 4:39 pm
by ToTheFull
I moved straight to 7.12alpha...
Sorry if I gave bad info.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 18, 2023 10:05 am
by carl0s
Pretty cool.
I do still buy Hex (RB 750gr3) though. They're good spec, dual core, SD slot, IPsec acceleration, so feels like they should not be left behind. I'm not sure there is a direct replacement for that model? Maybe hap ax2 is close but they have different uses
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 18, 2023 10:14 am
by PackElend
Will this solution allow VPN via 443 only and to accept custom Root CA?
That would allow to reach the router out of cooperate networks.
Thx
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 18, 2023 10:20 am
by gigabyte091
Pretty cool.
I do still buy Hex (RB 750gr3) though. They're good spec, dual core, SD slot, IPsec acceleration, so feels like they should not be left behind. I'm not sure there is a direct replacement for that model? Maybe hap ax2 is close but they have different uses
Maybe something like hAP ac2, it has USB, arm CPU, 5×1Gig eth ports, wifi but you can disable that if you don't need it. Or maybe new L009 ?
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 18, 2023 11:06 am
by carl0s
Pretty cool.
I do still buy Hex (RB 750gr3) though. They're good spec, dual core, SD slot, IPsec acceleration, so feels like they should not be left behind. I'm not sure there is a direct replacement for that model? Maybe hap ax2 is close but they have different uses
Maybe something like hAP ac2, it has USB, arm CPU, 5×1Gig eth ports, wifi but you can disable that if you don't need it. Or maybe new L009 ?
Yes it's close. It's just the USB feels fragile and temporary. Although, I haven't really been using the SD. It's just that I think I should, and might use it, for capsman firmware updates.
Also, using a wireless router for the non-wireless role just looks confusing. Like, someone might think "is this thing working?" or something.
The rb750gr3 has been my go-to mini main-router & capsman controller.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 18, 2023 12:24 pm
by gigabyte091
You can disable WiFi, or you can use L009 version without wifi
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 22, 2023 8:14 am
by rushlife
Hi, new feature is really awesome. App for android and iPhone/iPad/MacBook already tested and they are great.
Will be there also app for windows ?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Aug 22, 2023 9:13 am
by normis
For windows you can use Wireguard app
https://www.wireguard.com/install/
You will need to copy the config from your router, that is provided in menu "IP > Cloud > BTH wireguard"
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 25, 2023 2:36 am
by unizhu
What does "use local address" mean?
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 25, 2023 12:33 pm
by normis
use-local-address is not for Back to Home. It is for Cloud DNS.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 25, 2023 5:44 pm
by unizhu
use-local-address is not for Back to Home. It is for Cloud DNS.
So what will happen if I enable use-local-address ? The Cloud DNS will be set to my local public ipv4 address?
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Aug 25, 2023 6:11 pm
by spippan
use-local-address is not for Back to Home. It is for Cloud DNS.
So what will happen if I enable use-local-address ? The Cloud DNS will be set to my local public ipv4 address?
it appears to be that way:
https://help.mikrotik.com/docs/display/ ... d-Advanced
Re: Back to Home VPN
Posted: Wed Aug 30, 2023 10:25 pm
by PackElend
Answers to common questions:
1) It uses Wireguard and is a secure VPN
2) (If used) Relay does not decrypt your tunnel and has no access to your data
any chance that connection to the relay server goes via port 443?
So that I can use BTH from within restricted networks.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Aug 31, 2023 3:34 pm
by normis
yes, but it does not matter for BTH. That is for Cloud DNS feature, unrelated to this topic. BTH does not care if you have public or private IP.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Sep 01, 2023 1:55 am
by spippan
yes, but it does not matter for BTH. That is for Cloud DNS feature, unrelated to this topic. BTH does not care if you have public or private IP.
thanks for the clarification
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 04, 2023 8:38 pm
by Milecus
I'd like to know what will be the consumption of ВТН traffic in idle mode?
(device behind a NAT; а metered Internet connection; per day;)
Is there a possibility of optimization?
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Sep 06, 2023 9:40 pm
by Jarek9008
Hi, I have a problem with the correct connection between Wireguard BTH and AdGuard Home, namely - AdGuard Home placed on the container, VETH interface in the main bridge, AdGuard address set as DNS in the DHCP server, Wireguard works properly as it should, I have access via a connection VPN with internal network, etc. - generally works, with one exception - in the Wireguard Client on Android, DNS set as the AdGuard address, it also works, but in the AdGuard admin panel in the logs this connection is shown at the Router's gateway address, not as the address assigned in Wireguard - the question is what to do that it works with Wireguard address in AdGuard admin panel? Thank you in advance for your help.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Sep 06, 2023 10:06 pm
by Amm0
[...] AdGuard Home placed on the container, VETH interface in the main bridge, AdGuard address set as DNS in the DHCP server, Wireguard works properly as it should [...] AdGuard admin panel in the logs this connection is shown at the Router's gateway address, not as the address assigned in Wireguard - the question is what to do that it works with Wireguard address in AdGuard admin panel? [...]
I suppose you can create a /ip/firewall/nat action=src-nat rule so the VETH's IP be masqueraded to router's WG address, when going out wireguard. Issue is the LAN subnet (including VETH) is likely already allowed addresses, so VETH is just another bridge member, so it use the router's IP and thus using normal WAN NAT rule.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Sep 06, 2023 10:48 pm
by Jarek9008
[...] AdGuard Home placed on the container, VETH interface in the main bridge, AdGuard address set as DNS in the DHCP server, Wireguard works properly as it should [...] AdGuard admin panel in the logs this connection is shown at the Router's gateway address, not as the address assigned in Wireguard - the question is what to do that it works with Wireguard address in AdGuard admin panel? [...]
I suppose you can create a /ip/firewall/nat action=src-nat rule so the VETH's IP be masqueraded to router's WG address, when going out wireguard. Issue is the LAN subnet (including VETH) is likely already allowed addresses, so VETH is just another bridge member, so it use the router's IP and thus using normal WAN NAT rule.
But I used Zerotier and in this case in AdGuard admin panel I saw ip address from Zerotier.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Sep 06, 2023 11:06 pm
by nichky
What does "use local address" mean?
If your router is behind another router, enabling this checkbox will update the ddns entry with its local address (e.g. 192.168.1.x).
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Sep 06, 2023 11:26 pm
by Amm0
[...] Issue is the LAN subnet (including VETH) is likely already allowed addresses, so VETH is just another bridge member, so it use the router's IP and thus using normal WAN NAT rule.
But I used Zerotier and in this case in AdGuard admin panel I saw ip address from Zerotier.
It was just one suggestion. BTH I believe NAT's everything via dynamically added NAT masquerade rule and that's what you're running into. Hard to visualize without config... but maybe better to use an accept rule for the dst-address of your AdGuard container, and place before the BTH NAT rule.
In other words — It the the default BTH NAT rule's behavior you need work-around since you can't disable BTH's NAT rule that's added automatically by RouterOS.
If ZeroTier is working, one less thing to worry about— it's just different than BTH. ;)
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Sep 07, 2023 5:57 pm
by Jarek9008
But I used Zerotier and in this case in AdGuard admin panel I saw ip address from Zerotier.
It was just one suggestion. BTH I believe NAT's everything via dynamically added NAT masquerade rule and that's what you're running into. Hard to visualize without config... but maybe better to use an accept rule for the dst-address of your AdGuard container, and place before the BTH NAT rule.
In other words — It the the default BTH NAT rule's behavior you need work-around since you can't disable BTH's NAT rule that's added automatically by RouterOS.
If ZeroTier is working, one less thing to worry about— it's just different than BTH. ;)
I'm rather beginer with Mikrotik, so can You write me, how should look NAT rule, which I need to place before this dynamic BTH NAT rule?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Sep 07, 2023 7:40 pm
by Amm0
In other words — It's the the default BTH NAT rule's behavior you need work-around since you can't disable BTH's NAT rule that's added automatically by RouterOS.
I'm rather beginer with Mikrotik, so can You write me, how should look NAT rule, which I need to place before this dynamic BTH NAT rule?
Hard to do this blind without config. And there may be other solutions and/or other firewall may effect solution... but something like this:
/ip/firewall/nat add action=accept protocol=udp port=53 src-address=192.168.216.2 place-before=0 chain=src-nat
/ip/firewall/nat add action=accept protocol=tcp port=53 src-address=192.168.216.2 place-before=0 chain=src-nat
The action=accept say to not NAT traffic from WG BTH peer's IP to UDP or TCP to the DNS port 53, since the BTH NAT rule (e.g. with the "D" in left most column) is first by default, these need to be before that rule, which is what the place-before=0 does. You can do same in winbox creating IP > Firewall > NAT, setting protocol, port, etc. and dragging the new rules to the first in the list.
What I don't know myself is how aggressive BTH's dynamic NAT rule is... e.g. will BTH NAT rule will move itself first in list via some reboot/background process/config changes.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Sep 07, 2023 10:00 pm
by Jarek9008
I'm rather beginer with Mikrotik, so can You write me, how should look NAT rule, which I need to place before this dynamic BTH NAT rule?
Hard to do this blind without config. And there may be other solutions and/or other firewall may effect solution... but something like this:
/ip/firewall/nat add action=accept protocol=udp port=53 src-address=192.168.216.2 place-before=0 chain=src-nat
/ip/firewall/nat add action=accept protocol=tcp port=53 src-address=192.168.216.2 place-before=0 chain=src-nat
The action=accept say to not NAT traffic from WG BTH peer's IP to UDP or TCP to the DNS port 53, since the BTH NAT rule (e.g. with the "D" in left most column) is first by default, these need to be before that rule, which is what the place-before=0 does. You can do same in winbox creating IP > Firewall > NAT, setting protocol, port, etc. and dragging the new rules to the first in the list.
What I don't know myself is how aggressive BTH's dynamic NAT rule is... e.g. will BTH NAT rule will move itself first in list via some reboot/background process/config changes.
Thank You very much for help - it works! 👍🙂
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Sep 08, 2023 9:51 am
by zandhaas
i'm using the iPhobe BTH app.
Yesterday I encounterd the app was not able to connect anymore. Reason unknown sofar.
But when I added a new tunnel to the same router everything worked again but........
I then wanted to remove the old tunnel from the app. I could not find a delete option so I had to remove the app and reinstall it again after which I again had to add a new tunnel.
Two questions:
It would be nice to have an delete option for tunnels in the app and
A number somewhere in the configuration to see which router BTH config belongs to which tunnel in the app so it's easy to remove the old router BTH config's
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Sep 08, 2023 11:20 am
by normis
The BTH config name matches the system VPN tunnel name already.
We plan to add "delete tunnel" feature in the app.
If you see such a situation that tunnel is not working, make a supout.rif file and email us, maybe support can see what happened.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Sep 08, 2023 1:58 pm
by zandhaas
The BTH config name matches the system VPN tunnel name already.
We plan to add "delete tunnel" feature in the app.
If you see such a situation that tunnel is not working, make a supout.rif file and email us, maybe support can see what happened.
For the new tunnel I configured the same tunnel name so .....
And I'm still running ROS 7.11 beta7 and the iPhone app was updated een week ago or so. My thought was that it could have impact. So I did not open a ticket. Next time I will not think to much myself and leave it to you :)
Re: Back to Home VPN
Posted: Sat Sep 16, 2023 7:52 am
by stmx38
Answers to common questions:
1) It uses Wireguard and is a secure VPN
2) (If used) Relay does not decrypt your tunnel and has no access to your data
any chance that connection to the relay server goes via port 443?
So that I can use BTH from within restricted networks.
Get into the same issue at least twice and was not able to use VPN. Is there a way to set 443 port?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 18, 2023 8:28 am
by normis
In your country is there like a whole range of blocked ports, or how does that work?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 18, 2023 3:52 pm
by stmx38
In your country is there like a whole range of blocked ports, or how does that work?
The last time it happened when I was at Nova Poshta office in Ukraine and tried to connect to my home router to make a call to local Nova Poshta office. I didn't check ports, but my voice app didn't work and probably because of the blocked ports, this is why I've tried to use BTH. By the end I've switched to Skype Out.
I had similar issue in the Romanian Airport.
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Sep 24, 2023 9:17 pm
by miankamran7100
Dear all concern,
Unexpected behavior of BTH. Sometimes BTH on the Windows wireguard client is connected and works smoothly. After some time it's not connected and I have tried many times to disable and enable BTH in IP Cloud. but no result still not connecting.
it is not a permanent solution.
I tried many times on many sites on different ISPs but still have the same problem.
I thought the Mikrotik BTH relay server was down???? or maybe there bug in the ROS
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Sep 24, 2023 9:24 pm
by gigabyte091
Tested right now, relay is working without a problem. Maybe problem is on windows machine ?
Did you try to connect with mobile app ?
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Sep 24, 2023 10:01 pm
by TeWe
Working fine for me as well.
miankamran7100 - could it be a problem with your laptop's WiFi?
Intel released a new Windows driver these days which finally resolves those random disconnect issues (22.250.1).
Mentioned here:
https://www.neowin.net/news/intel-relea ... ss-issues/
and here:
https://downloadmirror.intel.com/788770 ... .250.1.pdf
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Sep 24, 2023 10:48 pm
by miankamran7100
Tested right now, relay is working without a problem. Maybe problem is on windows machine ?
Did you try to connect with mobile app ?
I have tried to reconnect now it's working.
I don't know why it's happening.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 6:49 am
by nichky
is ther any issue with Back_To_home?
i'm no longer able to ping = 78.28.208.100
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 7:07 am
by nichky
actually , my issues is when i'm using LTE im not able to establish back to home
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 8:15 am
by gigabyte091
Back to home works like it should, at least for me, just test it, I'm connecting to my home router via app, speeds and ping as usual. Also can't ping 78.28.208.100
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 9:10 am
by Smoerrebroed
Correction: Apparently now you need to run 7.12. I just tested with my RB5009 on 7.11.2 and it complains that the device isn't compatible. :(
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 9:15 am
by gigabyte091
Just update to latest beta, it's stable.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 9:32 am
by nichky
yeah it does work, but transferring from one to another it takes too long.
That is my job to find out why
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 5:40 pm
by axe3
Feature request: could you add the ability for this VPN to be used by devices connected to the Mobile Hotspot?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 5:42 pm
by normis
I think that is a phone OS limitation. If I remember correctly, you can't use any VPN through mobile hotspot. Each connected device needs to connect on their own.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 7:05 pm
by axe3
Apparently there's a workaround, by using a proxy, I've seen that something like
superpoxy or
everyproxy which do not require Android root permissions, can be used to share a VPN connection. I suppose then it would be possible to integrate such functionality within a VPN app.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 11:05 pm
by Smoerrebroed
Just update to latest beta, it's stable.
Oh, I'm sure that'll work, but the starting post in this thread mentions ROS 7.11 as a requirement, and that is no longer accurate.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Sep 25, 2023 11:30 pm
by Amm0
Feature request: could you add the ability for this VPN to be used by devices connected to the Mobile Hotspot?
I think there is a double-NAT going on when you use a mobile hotspot... That might be solvable.
- You might able to set the Mikrotik as the "DMZ host" if your hotspot has admin page/screen.
- The other way, perhaps, is involving
https://help.mikrotik.com/docs/display/ ... pendentNAT but you need to look at the traffic flows to know if that work/help.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Sep 26, 2023 8:00 am
by gigabyte091
Oh, I'm sure that'll work, but the starting post in this thread mentions ROS 7.11 as a requirement, and that is no longer accurate.
That should be changed now because Mikrotik stated that BTH won't be available in ROS 7.11 but can be used from 7.12beta and up.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Sep 26, 2023 12:11 pm
by axe3
Feature request: could you add the ability for this VPN to be used by devices connected to the Mobile Hotspot?
I think there is a double-NAT going on when you use a mobile hotspot... That might be solvable.
- You might able to set the Mikrotik as the "DMZ host" if your hotspot has admin page/screen.
- The other way, perhaps, is involving
https://help.mikrotik.com/docs/display/ ... pendentNAT but you need to look at the traffic flows to know if that work/help.
I'm a bit confused by your answer, I think you might be talking about a different kind of hotspot?
What I'm talking about is the 'Mobile Hotspot' functionality in Android. It's for sharing your phones mobile data with other devices as a wifi network. The issue with this is, that if you enable a VPN on your phone, the traffic originating from the phone is routed through the VPN, but (relevant to my 'Feature request')
the phone does not route traffic from the other tethered devices connected to the phone's 'Mobile Hotspot' over the VPN tunnel, it goes directly out to the internet. Since this is the case, clearly your second suggestion does not apply, since the tethered traffic would never hit the Mikrotik device. I'm guessing your first suggestion also isn't talking about the Android 'Mobile Hotspot' feature
But seeing as there are workarounds to this using proxies like
superproxy or
everyproxy I wonder if this functionality could be included within the VPN app, so no additional workaround is needed.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Sep 26, 2023 12:13 pm
by normis
Can you name a commercial VPN solution that has such functionality? We can't make a solution based on workarounds, especially if it's not supported in all OS.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Sep 26, 2023 12:34 pm
by axe3
No, I'm not aware of any (I haven't looked for such). But I would be interested to have my computer appear to be at home while using my phones mobile data without having to do additional setup on the computer itself. I suppose this kind of functionality would have to be an optional feature, as at least the mentioned proxies are protocol specific (e.g. http/https) and not general purpose for all traffic?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Sep 26, 2023 12:39 pm
by PackElend
If I'm not mistaken this
But seeing as there are workarounds to this using proxies like
superproxy or
everyproxy I wonder if this functionality could be included within the VPN app, so no additional workaround is needed.
could solve this
any chance that connection to the relay server goes via port 443?
So that I can use BTH from within restricted networks.
Get into the same issue at least twice and was not able to use VPN. Is there a way to set 443 port?
?
Can you name a commercial VPN solution that has such functionality? We can't make a solution based on workarounds, especially if it's not supported in all OS.
would rather have a unique selling point instead of copying another provider.
Don't you think that is worth providing such a feature?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Sep 26, 2023 12:57 pm
by eworm
If you have these requirements you should think about using a Mikrotik device with LTE modem. You can set up routing to your needs there.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Sep 26, 2023 5:40 pm
by Amm0
Re "mobile hotspot" — my bad, iPhone user here — I though you mean an external device, not the "tethering" with Android. But it's a double-NAT and the CGNAT may not be able to map the needed BTH port.
Can you name a commercial VPN solution that has such functionality? We can't make a solution based on workarounds, especially if it's not supported in all OS.
If you consider WebRTC's DataChannels/SCTP as a VPN, they use ICE (plus STUN/TURN) "things" to help with figure out NAT situation to transport data through NAT/firewall.
But BTH could do the ICE/STUN/TURN standard dance (outside of WebRTC/SIP) on /ip/cloud's backend, to augment port selection for BTH/WG. That be useful even without BTH to do "NAT type detection" inside RouterOS.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 02, 2023 7:35 am
by nichky
qr code doesn't work any more.
was working fine before upgrading
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 04, 2023 4:46 pm
by petardo
BTH doesn't support mips cpu.
At most of our premises we have hEX as the main router - which is not supported yet.
Is is a good idea to use hAP ax lite instead of hEX? Does it have the same throughput?
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 04, 2023 5:39 pm
by holvoetn
Don't make a mistake about the name 'lite'.
AX Lite is performance wise not that much worse then Hex.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 04, 2023 8:04 pm
by petardo
Thanks for reply.
So, not that worse means worse? - I didn't find any info regarding this.
If worse, in which parameter worse?
My use case is simple wired router / firewall / Wireguard VPN.
If hAP ax lite is not worse for that use case I'll buy that instead of hEX in the future - hence cheaper and BTH compatible.
(WIFI will be switched off)
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 04, 2023 8:13 pm
by holvoetn
Check test results of both devices but keep in mind results from Hex are ROS6 based, AX Lite are ROS7 based.
I did some rudimentary testing with AX Lite using 3 VPN protocols: wireguard, zerotier and ipsec.
See here:
viewtopic.php?t=193126
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 04, 2023 9:07 pm
by petardo
I didn't find any hEX results in that thread
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 04, 2023 9:13 pm
by holvoetn
Logical.
I didn't say I tested that one (I do have it, was my very first MT device).
Do your own testing
I was also referring to test results on product pages for both devices.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 04, 2023 9:56 pm
by petardo
https://1drv.ms/i/s!Aukw5KCzXdEthpw4MTL ... Q?e=L6hcwG
Rother mixed picture, dependency from pocket size.
What do you think?
Additional thoughts:
As I just noticed, hAP AC2 is not much more expensive and outperforms both hEX and hAP AX Lite.
I just don't like it because it's warming issue.
However with wireless off hopefully no warming issue exists.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 09, 2023 11:38 pm
by miankamran7100
not able to SCAN wireguard QR Codes on mobile phones?
How to Scan QR Code.
It is not shown fully in Mikrotik Windows.
It shows half.
Help...
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 1:15 am
by NetHorror
photo_2023-10-10_01-15-11.jpg
AX3 is ARM64!! (7.12rc1)
and for AC3 too!!
Screenshot_5.png
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 5:39 am
by gigabyte091
BTH is only available in beta versions of ROS for now. You need to install beta version of ROS if you want to use BTH.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 10:39 am
by nostromog
I tried it with a hAP AC2, upgrading from 7.11.2 and got a boot-loop. Slow: boot, crash, reboot. Fortunately I was able to downgrade (fast SSH through several boot-crash-reboot cycles) and regained control. So I will wait for a while to install 7.12
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 12:14 pm
by NetHorror
BTH is only available in beta versions of ROS for now. You need to install beta version of ROS if you want to use BTH.
It was in RC1 changelog.
==================================
Where I can find beta with BTH with changes in RC1?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 12:38 pm
by gigabyte091
As @holvoetn said:
Use URL for rc package and modify as needed.
It worked for me just fine.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 2:06 pm
by normis
new BTH will come in 7.13beta1
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 2:09 pm
by TeWe
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 2:26 pm
by PackElend
new BTH will come in 7.13beta1
What is the difference?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Oct 10, 2023 2:41 pm
by normis
You will see when it comes out
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 11, 2023 8:10 pm
by hlp937
While in Beta, we have a relay in the MikroTik data center in Latvia. Depending on demand, we will expand to other regions and will lauch relays in other countries. If somebody here works in a well connected data center with high speed connectivity, you are welcome to drop us an email :D
Hello, greetings, my name is Hector Prado, I live in the United States. What do you need to participate in this project?
my email is
hlp937@gmail.com
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 11, 2023 8:27 pm
by Jotne
Just download 7.12beta to an Arm router.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Oct 11, 2023 8:38 pm
by gigabyte091
I think that mr.Hector here is talking about what is needed for another relay station for BTH.
I think that best option is to contact Mikrotik support directly.
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Oct 15, 2023 6:33 pm
by piotrek2555
don`t working on my hap ac3 with 7.12rc1
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Oct 15, 2023 7:38 pm
by holvoetn
Normal.
Wait for 7.13 beta or use 7.12 beta 9.
Feature has been disabled in rc and stable.
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Oct 15, 2023 9:01 pm
by NetHorror
Screenshot_5.png
ROS 7.12beta9 + WinBox 3.40
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 16, 2023 1:05 pm
by Jotne
It looks like many need to read the thread before post.
1. Back to Home are moved to v7.13 but can be found in 7.12beta releases.
2. QR code will be fixed
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 16, 2023 1:39 pm
by ToTheFull
Would this BTH work from my cap ax setup in caps mode. Thought process off-load to the cap. I do intend to buy a 5009 but that wont be till I get better speed from an ISP some time next year. Modem>>hAP ax2>>cAP ax<<BTH setup
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 16, 2023 1:57 pm
by holvoetn
If the correct version is on that device, it should work.
But why not on AX2 ?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 16, 2023 2:09 pm
by normis
you can run it on any of the devices in your network, but I personally would put it on the hAP ax2, yes
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 16, 2023 2:17 pm
by Amm0
@holvoetn's question is a good one.
But why not on AX2 ?
While BTH should work* on a cAP downstream of ISP, it will be proxied via Latvia. Assuming the hAPax2 has a public IP, if BTH runs there it will NOT be proxied, and direct connection from remote BTH/WG client will be used. Proxying is slower and avoidable if BTH does run on a device with public IP. In theory, you can forward the BTH port from hAPax2 to the cAP which avoid the proxy. But all easier if BTH was on the edge AX2 router.
* in a beta release
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 16, 2023 4:52 pm
by ToTheFull
Thanks for the Input all, I'll keep it on the AX2 as that makes it better from a proxy stand point alone.
I was just wanting to off-load whatever I could to save on the AX2 resources, but as recommended that isn't the best option.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Oct 23, 2023 5:46 pm
by axe3
Feature request: could you add the ability for this VPN to be used by devices connected to the Mobile Hotspot?
Anyway, irrespective of this comment, I want to say a big thanks to Mikrotik as the feature in any case solves an issue for me. I have a router behind CGNAT at one of my places which I want to access remotely and was planning to solve it with a free setup of a container with Cloudflare Quick tunnel + custom container that would update the randomly generated tunnelname to a git repo I have access to for cases I wanted to access the network.
Nice work, thanks! 😃
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Nov 08, 2023 6:35 pm
by balves
It's a great feature, but there is one issue. When I connect to the VPN on my iPhone running iOS 17.1, I'm unable to access the router via SSH. I've been using iPhone shortcuts to enable or disable firewall rules, and it works perfectly through the web or the MikroTik app.
I have granted permission for the network 192.168.261.0/24 to access SSH through the firewall and in the services configuration.
Has anyone else encountered this issue and managed to find a solution?
Thanks
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 09, 2023 4:14 pm
by balves
It's a great feature, but there is one issue. When I connect to the VPN on my iPhone running iOS 17.1, I'm unable to access the router via SSH. I've been using iPhone shortcuts to enable or disable firewall rules, and it works perfectly through the web or the MikroTik app.
I have granted permission for the network 192.168.261.0/24 to access SSH through the firewall and in the services configuration.
Has anyone else encountered this issue and managed to find a solution?
Thanks
Solve it, forgot to add the network to user!
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Nov 10, 2023 5:13 pm
by kiaunel
Any chance that in the app you can insert an option to manually disable relay server? My case is that I have local address on mikrotik but all traffic is redirected from modem. No, I can not setup modem in bridge mode. So for me any connection goes to my public ip will arrive on mikrotik. I think I am not the only one in this situation so for many this feature will be usefull
Re: Back to Home VPN
Posted: Sun Nov 12, 2023 9:57 am
by ROCCAT
Answers to common questions:
1) It uses Wireguard and is a secure VPN
2) (If used) Relay does not decrypt your tunnel and has no access to your data
3) It secures your router with firewall, it does not open up full access to your router in any way
4) It is not a feature for anonymity, it is a home user feature for maximum ease of use.
5) If you wish, after you have enabled it with our BTH app, you can also connect using Wireguard on your computer. You can use the QR code in Winbox IP CLOUD menu to get the needed config to your computer
Hello, have you thought about integrating User Manager as a WireGuard administrator?
Greetings from CUBA.
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Nov 12, 2023 6:42 pm
by sas2k
@normis, Do you plan to make BTH available for MT7621A?
Thanks
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Nov 12, 2023 7:10 pm
by mantouboji
BTH is good, but the problem is in the ddns of IP cloud.
The ddns detects the IP and IPv6 address automatically, but in my scenario, since use WireGuard VPN to access any site out of China, the ddns will get the address of my VPS, not my real one, so BTH forward will fail.
So you’d better add an option to make ddns use the address of local interface , for instance the pppoe-out1 , ranther than remote auto detect.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Nov 27, 2023 6:13 pm
by gjniewenhuijse
I have a Hap ac^2 and a Hap ax^2. For both devices the IOS BTH app and Wireguard app works great.
But BTH doesn't work with a windows client for the hAP ac^2. Same config for hAP ax^2 works. I tried it on different windows devices and different clients. I can connect to the Hap ac^2 with winbox, but all menu items are empty. With ios app i see all the data.
What can be the problem?
I created the BTH function on the mikrotik devices with the BTH mikrotik app.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Nov 28, 2023 12:28 am
by nichky
it does perfectly fine, i've added everything manually.
show us here how u do
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Nov 28, 2023 11:16 am
by gjniewenhuijse
I added the config with the BTH app, it created the right config. And as i say it works with ios, but not with the windows client. Only problems with 1 Mikrotik router, the others works great
My VPN Wireguard client config:
[Interface]
PrivateKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Address = 192.168.216.2/32,fc00:0:0:216::2/128
DNS = 8.8.8.8
[Peer]
PublicKey = //////////////////////////////////////////8=
AllowedIPs = 0.0.0.0/32
Endpoint = hcf07r99zar.sn.mynetname.net:12657
PersistentKeepalive = 15
[Peer]
PublicKey = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
AllowedIPs = 0.0.0.0/0,::/0
Endpoint = hcf07r99zar.vpn.mynetname.net:12657
PersistentKeepalive = 15
Backup config:
# 2023-11-28 10:08:18 by RouterOS 7.12.1
# software id = 93RL-JAG9
#
# model = RBD52G-5HacD2HnD
# serial number = HCF07R99ZAR
/interface bridge
add admin-mac=DC:2C:6E:F5:66:60 auto-mac=no comment=defconf name=bridge
/interface ethernet
set [ find default-name=ether1 ] comment=wan name="ether1 wan"
set [ find default-name=ether2 ] comment=lan
/interface wireguard
add comment=back-to-home-vpn listen-port=12657 mtu=1420 name=back-to-home-vpn
/interface wireless manual-tx-power-table
set wlan2 comment=wifi
/interface wireless nstreme
set wlan2 comment=wifi
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
add name=VPN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk mode=\
dynamic-keys supplicant-identity=MikroTik
add authentication-types=wpa-psk,wpa2-psk mode=dynamic-keys name=\
"profile gast" supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=hotspot
/ip pool
add name=dhcp ranges=192.168.8.10-192.168.8.254
/ip dhcp-server
add address-pool=dhcp interface=bridge lease-time=1d name=defconf
/interface bridge filter
add action=drop chain=forward in-interface="wlan5 gast"
add action=drop chain=forward out-interface="wlan5 gast"
add action=drop chain=forward in-interface="wlan2 gast"
add action=drop chain=forward out-interface="wlan2 gast"
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
add bridge=bridge comment=defconf interface=wlan2
add bridge=bridge comment=defconf interface=wlan5
add bridge=bridge interface="wlan5 gast"
add bridge=bridge interface="wlan2 gast"
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface="ether1 wan" list=WAN
/ip address
add address=192.168.8.1/24 comment=defconf interface=bridge network=\
192.168.8.0
/ip cloud
set back-to-home-vpn=enabled ddns-enabled=yes
/ip dhcp-client
add comment=defconf interface="ether1 wan"
/ip dhcp-server network
add address=192.168.8.0/24 comment=defconf dns-server=192.168.8.1 gateway=\
192.168.8.1 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.8.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="accept router management from VPN" \
dst-address=192.168.8.1 dst-port=80,8291 in-interface-list=VPN protocol=\
tcp
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
disabled=yes ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
disabled=yes ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=accept chain=forward comment="accept from VPN" dst-address=\
192.168.8.2 dst-port=80 in-interface-list=VPN protocol=tcp
add action=drop chain=forward comment="drop all from VPN" in-interface-list=\
VPN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
/ip route
add disabled=no distance=1 dst-address=192.168.2.0/24 gateway=\
"ovpn client" pref-src="" routing-table=main scope=30 \
suppress-hw-offload=no target-scope=10
/ip service
set telnet disabled=yes
set ftp disabled=yes
set ssh disabled=yes
set api disabled=yes
set api-ssl disabled=yes
/ipv6 firewall address-list
add address=::/128 comment="defconf: unspecified address" list=bad_ipv6
add address=::1/128 comment="defconf: lo" list=bad_ipv6
add address=fec0::/10 comment="defconf: site-local" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="defconf: ipv4-mapped" list=bad_ipv6
add address=::/96 comment="defconf: ipv4 compat" list=bad_ipv6
add address=100::/64 comment="defconf: discard only " list=bad_ipv6
add address=2001:db8::/32 comment="defconf: documentation" list=bad_ipv6
add address=2001:10::/28 comment="defconf: ORCHID" list=bad_ipv6
add address=3ffe::/16 comment="defconf: 6bone" list=bad_ipv6
/ipv6 firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=input comment="defconf: accept UDP traceroute" port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"defconf: accept DHCPv6-Client prefix delegation." dst-port=546 protocol=\
udp src-address=fe80::/10
add action=accept chain=input comment="defconf: accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=input comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=input comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=input comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
add action=accept chain=forward comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop packets with bad src ipv6" src-address-list=bad_ipv6
add action=drop chain=forward comment=\
"defconf: drop packets with bad dst ipv6" dst-address-list=bad_ipv6
add action=drop chain=forward comment="defconf: rfc4890 drop hop-limit=1" \
hop-limit=equal:1 protocol=icmpv6
add action=accept chain=forward comment="defconf: accept ICMPv6" protocol=\
icmpv6
add action=accept chain=forward comment="defconf: accept HIP" protocol=139
add action=accept chain=forward comment="defconf: accept IKE" dst-port=\
500,4500 protocol=udp
add action=accept chain=forward comment="defconf: accept ipsec AH" protocol=\
ipsec-ah
add action=accept chain=forward comment="defconf: accept ipsec ESP" protocol=\
ipsec-esp
add action=accept chain=forward comment=\
"defconf: accept all that matches ipsec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"defconf: drop everything else not coming from LAN" in-interface-list=\
!LAN
/system clock
set time-zone-name=Europe/Paris
/system identity
set name="xxxxxxxx"
/system note
set show-at-login=no
/system routerboard settings
set auto-upgrade=yes
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Nov 29, 2023 5:45 pm
by normis
We have released new Back To Home apps for both iPhone and Android. Some exciting new features have been added - sharing of tunnels. Normally you only could use one device to connect to the router (as seen above, using multiple devices causes problems).
Now you can invite others to use your router, by sending them time limited invites to your VPN. Share using a link, using a QR code, or even the Wireguard config file for using in your PC.
Try it out and let us know, how to improve the flow and user experience of the app!
Make sure you upgrade to at least RouterOS 7.12 and install the newest phone app relesed today
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Nov 29, 2023 6:07 pm
by gjniewenhuijse
how to remove existing BTH functionality and start from the beginning with the new app?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 9:28 am
by Juan58
Hello,
I use BTH between an iPhone and an Audience. The Audience is behind a CGNAT (LTE) network. A reboot of Audience is necessary every day for it to work. Audience is connected to the internet but without reboot BTH from Iphone app no longer connects.
I don't understand what's blocking it. Disable/ Enable of the WireGuard interface is not sufficient.DNS cache ? Do you have any ideas ?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 9:55 am
by normis
how to remove existing BTH functionality and start from the beginning with the new app?
IP -> Cloud -> BTH -> Revoke and Disable
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 9:55 am
by normis
Hello,
I use BTH between an iPhone and an Audience. The Audience is behind a CGNAT (LTE) network. A reboot of Audience is necessary every day for it to work. Audience is connected to the internet but without reboot BTH from Iphone app no longer connects.
I don't understand what's blocking it. Disable/ Enable of the WireGuard interface is not sufficient.DNS cache ? Do you have any ideas ?
How do you mean "no longer connects". Is there an error somewhere? In the BTH app?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 10:01 am
by zandhaas
how to remove existing BTH functionality and start from the beginning with the new app?
IP -> Cloud -> BTH -> Revoke and Disable
And how to remove existing connections from the app?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 10:02 am
by normis
in the phone settings go to VPN configuation and delete there
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 10:05 am
by zandhaas
in the phone settings go to VPN configuation and delete there
Thanx
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 10:05 am
by zandhaas
in the phone settings go to VPN configuation and delete there
Thanx
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 12:43 pm
by gjniewenhuijse
how to remove existing BTH functionality and start from the beginning with the new app?
IP -> Cloud -> BTH -> Revoke and Disable
Ok, nothing changed in the firmware for BTH. So revoke and disable and after that enabled doesn't change anything for my problem?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 12:48 pm
by normis
Like I said above, you can't use multiple devices with the same settings. You must use the new Share feature in the phone app, to make a separate tunnel for each new device.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 2:29 pm
by Juan58
Hello,
I use BTH between an iPhone and an Audience. The Audience is behind a CGNAT (LTE) network. A reboot of Audience is necessary every day for it to work. Audience is connected to the internet but without reboot BTH from Iphone app no longer connects.
I don't understand what's blocking it. Disable/ Enable of the WireGuard interface is not sufficient.DNS cache ? Do you have any ideas ?
How do you mean "no longer connects". Is there an error somewhere? In the BTH app?
The application remains in the connecting state. Seen from the iPhone VPN menus, a tunnel exists but it does not work. After rebooting the router, the application switches to connected and the traffic passes through the tunnel. Do you kill unused tunnels at night?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 2:49 pm
by normis
please make a supout.rif file in the router at the time, when the tunnel is not working. and if you can - one more file, when it starts to work after reboot. send both files to
support@mikrotik.com, it could be an issue with RouterOS
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 3:04 pm
by Juan58
please make a supout.rif file in the router at the time, when the tunnel is not working. and if you can - one more file, when it starts to work after reboot. send both files to
support@mikrotik.com, it could be an issue with RouterOS
Thanks ! I will do that
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 3:32 pm
by gjniewenhuijse
Like I said above, you can't use multiple devices with the same settings. You must use the new Share feature in the phone app, to make a separate tunnel for each new device.
i don't use multiple devices at the same time.
and using a seperate tunnel with the sharing option doesn't change it.
and why al other mikrotiks i have works great and why this one not?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Nov 30, 2023 3:40 pm
by normis
In that case I don't understand what is not working. Please send an email to mikrotik support and include a supout,rif file and error message from the windows computer
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Dec 01, 2023 10:41 am
by cuky
Hello Normis! Please tell me when do you plan to release app update to android google playstore?
I see it's already available for iOS.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Dec 01, 2023 10:55 am
by normis
The same changes and sharing is already in Android app. It was simply released before iPhone
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Dec 01, 2023 8:29 pm
by cuky
Oh, I didn't see it.
It's here but the app has some bugs with the layout on the settings screen. I've just sent a bug report.
Thank you.
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Dec 02, 2023 11:22 am
by elico
@normis, I have just installed the BTH app on andorid and tried to connect to my device but it shows:
VPN Connection failed.
Do I open a ticket for that? I am using latest 7.12.1.
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Dec 02, 2023 10:49 pm
by Binser
How can I connect two mikrotik arm routers in different locations using B2H?
I would like to have my local network (PCs, phones) connect to my local mikrotik hap ac2 and connect to my other arm mikrotik router in another countries and surf the web with an IP address from the other country when I use any of my local devices.
What exactly would I need to do?
Thanks for your help. :)
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Dec 04, 2023 11:18 am
by Juan58
Hello,
I use BTH between an iPhone and an Audience. The Audience is behind a CGNAT (LTE) network. A reboot of Audience is necessary every day for it to work. Audience is connected to the internet but without reboot BTH from Iphone app no longer connects.
I don't understand what's blocking it. Disable/ Enable of the WireGuard interface is not sufficient.DNS cache ? Do you have any ideas ?
How do you mean "no longer connects". Is there an error somewhere? In the BTH app?
Hello, I think I found the problem. The BTH application enables DDNS, but it forgets the ddns-update-interval. As soon as the public IP address changes the DDNS may remain false and the tunnel may become inoperable. I don't know the 1m value is too low but it works.
/ip cloud
set back-to-home-vpn=enabled ddns-enabled=yes "I added" ddns-update-interval=1m
I think you need to correct the application setup
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 8:25 am
by mfrey
Are there any further settings required for the Android App? I configured a connection to my router and can successfully connect, but none of my traffic is actually routed over the VPN.
The router's DNS does not seem to be used at all and I can't reach any local device including the router itself. And internet traffic is also not routed over the tunnel.
Edit: I think the fault is on my smartphones side. Some apps seem to use the VPN just fine and some ignore it.
Edit2: The WireGuard-App is working fine however, maybe this is an app issue.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 8:30 am
by normis
About DDNS update time, it is a known issue and will be fixed in the next release.
Mfrey about your Android app - no other config should be needed. BTH works best with default config on home AP type devices. Maybe there is some more complex configuration on your device that is conflicting with BTH, or maybe you used an older version of BTH before? Send a supout.rif file to
support@Mikrotik.com and we will look at the situation. Maybe there is something we can do to improve the experience for future users.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 8:52 am
by mfrey
@normis I don't think this is related to the router config. I get the same behaviour with multiple routers and using the WireGuard-App is working just fine. I also already deleted and re-created the connections.
Somehow, the Mikrotik Home App is not even trying to forwarding the traffic of almost all apps. The only exception that I've found so far is the Play Store, whose traffic is tunneled.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 8:58 am
by normis
The App simply creates a system standard VPN profile, the app itself does not do any VPN tunneling.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 9:13 am
by normis
Check in the Settings - Show Advanced Connection Info, it will show how the connection was made - Direct, Relay, Relay hole-punched.
Also in the settings you can try to disable holepunching and see if it makes a difference.
another thing, check what you have in the app tunnel settings under allowed IPs;
Ir must be 0.0.0.0/0,::/0
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 10:07 am
by mfrey
The connection is done using IPv4-Relay. Disabling hole punching unfortunately didn't help. Also the tunnel settings are as you described.
I've tried the app on my iPhone now and tunneling is working fine with it. Maybe it has something to do with my Phone being rootet and running LineageOS. But as described, the WireGuard app is working perfectly fine on the same device.
What I'm really wondering about is how Play Store traffic is tunneled, but none of any other app I tried.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 11:24 am
by eworm
I think Android has a "security feature" to make play store traffic bypass VPN connections. Possibly that's the issue.
IIRC the wireguard app can force all traffic through its tunnels anyway.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 12:37 pm
by mfrey
@eworm That's interesting. But in my case it's the exact opposite and only Play Store traffic is routed trough the VPN.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 06, 2023 1:11 pm
by eworm
Oh, ok... I misread then.
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Dec 16, 2023 4:18 pm
by dcavni
Does hole punching and relay server works if you use ordinary Wireguard app? Every time i try to connect with wireguard to device behind NAT, there is no incoming traffic. If i use BTH it works perfectly.
Also, somehow i don't get any updates to the app, what is the last version?
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Dec 16, 2023 6:37 pm
by Amm0
In the iOS app, how do you remove a existing tunnel?
I can share them, but there is no "Delete" options/tab/swipe/etc that I can find.
If I remove the app from iPhone, and reinstall it...the tunnels are still even after removing app (and even rebooting phone).
I have test BTH on a few devices previously, none are still configured for BTH... so wanted to start fresh. But have a bunch of peers in the BTH app, that I cannot remove.
Ideas?
(using iOS BTH v0.7 + RouterOS 7.13)
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Dec 16, 2023 8:22 pm
by zandhaas
In the iOS app, how do you remove a existing tunnel?
in the phone settings go to VPN configuation and delete there
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Dec 16, 2023 11:05 pm
by Amm0
In the iOS app, how do you remove a existing tunnel?
in the phone settings go to VPN configuation and delete there
Geez, I should have figured that out. That works. Thanks!
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Dec 17, 2023 12:04 pm
by dcavni
What is the last Android app version?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Dec 19, 2023 1:15 am
by Voklav
I'm at this point where I have too many devices in different locations and I was wondering about a centralized method to set up the routers if something needed to happen.
And I accidentally found this thread.
is there a reason for the ARM/ARM64/TILE hardware limitation?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Dec 19, 2023 9:46 am
by normis
We would like to concentrate all newest and most exciting features on the currently manufactured devices first.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Dec 19, 2023 2:49 pm
by brankor
Why is Back to Home VPN missing from 7.13 RoS version?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Dec 19, 2023 3:38 pm
by dcavni
It's not on MIPS devices.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Dec 19, 2023 4:12 pm
by templeos
What is the last Android app version?
0.22 as the time of writing .There's an update waiting for you on the Play Store.
Changelog:
- Added LAN/Internet accessibility icons
- Added Allow/Block LAN option (ros 7.14+)
- Added support for new user manager (ros 7.14+)
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Dec 19, 2023 6:14 pm
by dcavni
Ok, i see it now, it just appeared. Thank you.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Dec 20, 2023 11:41 pm
by jimint
I downloaded the new version of BTH.
I have RB4011(version ROS 7.12.1) and the BTH app not connected(with qrcode).
I try to add manually the config file but when login in my router with BTH app then app crashed and closed.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Dec 21, 2023 1:52 am
by anav
Hi Normis, Two requests:
(1) Can you please explain the steps for an admin, behind a router without public IP and cannot forward a port to his MT router to create a BTH and send out a configuration to
a. an IOS iphone user
b. another MT router also without public IP.
It is not clear at least to me..... happy if you do this in a video instead ..........
(2) The configs I am starting to see people post are confusing the hell out of me........
they have
allowed IPs=xxxxx followed by client address=????
What the heck is client address or anything doing on the allowed IP config line?? ,,,,,, I tell people to get rid of it.........
if you want to do a Teams, or zoom of skype or discord chat, let me know.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Dec 25, 2023 6:22 pm
by miankamran7100
Is it possible to connect multiple Wireguard peers with Mikrotik at the same time? And use it for VPN service in an Organization instead of L2TP or SSTP?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Dec 25, 2023 8:51 pm
by gigabyte091
Did somebody else noticed ping increase and drop in speed ?
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jan 01, 2024 6:21 pm
by anav
Did somebody else noticed ping increase and drop in speed ?
Your post has no context. Do you mean if you are drinking a cup of coffee while running on the treadmill??
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jan 01, 2024 6:29 pm
by anav
Is it possible to connect multiple Wireguard peers with Mikrotik at the same time? And use it for VPN service in an Organization instead of L2TP or SSTP?
Have you used wireguard? Its not an enterprise solution where 1000s of employees need to VPN into work............
However yes, one can have many wireguard users attached to one mikrotik device ( for the handshake ) after that you have to understand each connection is a peer to peer connection between the client device and the mikrotik. Having each device on the same subnet makes it very easy for the MIKROTIK to relay traffic among its associated devices and they can be on the same wireguard interface or you can create multiple wireguard interfaces. Firewall rules and routes and allowed Ips allow very flexible approaches to connecting users and other routers.
For example I could have 5 clients, 3 of which are other routers and 2 are remote users.
They could be on one wireguard interface or five separate wireguard interfaces.
For simplicity and load, its easy to run only one one Wireguard Interface, however if firewall rules were not enough separation in that you wanted IP separation, you could assign 5 different IP addresses to the single wiregaurd interface on the MAIN server router. In this case, all the clients would not be on the same wireguard subnet structure, which may be a requirement, but for the admin they would all be on the same wireguard interface.
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jan 01, 2024 7:10 pm
by gigabyte091
Did somebody else noticed ping increase and drop in speed ?
Your post has no context. Do you mean if you are drinking a cup of coffee while running on the treadmill??
Yea i know, it was quickly written. I noticed that speed was cut in half and ping was about 250-300 ms instead of the regular 120 ms.
This is right now. Usually speeds were about 40 Mbps DL and 20 Mbps UL
Screenshot_2024-01-01-18-06-20-683_org.zwanoo.android.speedtest-edit.jpg
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Jan 01, 2024 8:51 pm
by anav
when?? using back to home wireguard, regular wireguard, something else......... again no context, we are not inside your head nor have any inkling of what network we are looking at etc...
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 02, 2024 7:15 am
by gigabyte091
Well... Back to home feature of course, otherwise i wouldn't post here. Phone is connecting to home router (ax3) via Mikrotik BTH app. Setup is mikrotik default when enabling BTH and config on the phone is imported by scanning qr code, nothing special.
Speeds on both home internet connection and phone are normal (home 180/120 with ping of 6 ms and 5G network with about 450/116 Mbps and 23 ms ping)
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 03, 2024 5:17 am
by rviteri
Hello, have you seen this from cloudflare
https://developers.cloudflare.com/cloud ... connector/ ? Maybe a warp connector can be implemented in ROS? This seems like it would save MK the need to setup relays around the world.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 10:58 am
by t0mm13b
What is the difference with this BTTH vs Zerotier?
Which would be the right one to use?
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 11:57 am
by holvoetn
Conceptually:
BTH uses wireguard = L3
Zerotier operates on L2 level.
So it depends on your requirements ... as usual with such questions.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 11:59 am
by normis
What is the difference with this BTTH vs Zerotier?
Which would be the right one to use?
Biggest difference is ease of use. To use BTH you only need a phone and the router's password. You don't even need to ever see Winbox or any other router config. Just connect and click enable.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 12:02 pm
by grusu
It would be very useful if there was something similar when you have to set up a laptop.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 12:05 pm
by normis
It is almost same, but you need to download the Wireguard app in your computer.
1) set up BTH via phone, just like normal
2) in BTH app click the Share button
3) Choose Wireguard config file option and send the file to your computer (iPhone to Macbook is the easiest, just AirDrop the file)
4) Open the file with Wireguard app and it's done
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 1:25 pm
by dcavni
It is almost same, but you need to download the Wireguard app in your computer.
1) set up BTH via phone, just like normal
2) in BTH app click the Share button
3) Choose Wireguard config file option and send the file to your computer (iPhone to Macbook is the easiest, just AirDrop the file)
4) Open the file with Wireguard app and it's done
Where is this share button? I have version 0.22 on Android and i cannot find this Share button anywhere.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 1:30 pm
by oskarsk
Pull up create / tunnel bar and on your selected tunnel right on the side is button for sharing.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 1:36 pm
by dcavni
Pull up create / tunnel bar and on your selected tunnel right on the side is button for sharing.
On the side of the tunnel selection bar i only have three dots, and if i press them it opens up tunnel settings. I don't see anything else.
https://www.dropbox.com/scl/fi/ip5l8w57 ... tdst6&dl=0
EDIT:
OK, i had to delete current configuration and create a new one. Then Manage Shares button appeared but it doesn't work. I'm guessing that's because i use different port than default for Winbox.
Ok, i checked. If i use default port, then it works ok.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 4:09 pm
by t0mm13b
Conceptually:
BTH uses wireguard = L3
Zerotier operates on L2 level.
So it depends on your requirements ... as usual with such questions.
Cheers for that
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 4:10 pm
by t0mm13b
What is the difference with this BTTH vs Zerotier?
Which would be the right one to use?
Biggest difference is ease of use. To use BTH you only need a phone and the router's password. You don't even need to ever see Winbox or any other router config. Just connect and click enable.
Cheers for that. Did not realise it needs DDNS service to be enabled for that to work.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 4:41 pm
by normis
dcavni you seem to have a very customised device. BTH is for people that don't want to configure their devices manually at all. So BTH works best with default config. If you are able to change ports and such things, you can create BTH setup manually too
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 5:22 pm
by anav
Yes, Normands, most interested in the manual setup.
My question is regarding how to setup the Mikrotik manually, when using your, for want of better word, cloud touch relay point. Its not a full blown WG server, but a connection point that allows users to reach the MT regardless (no public IP and ISP modem router unable to forward port etc. ).
Should the MT still be setup as though its a server for the handshake, lets cover the points.
a. input chain rule accept dst-port=xxxxx protocol=udp ??
b. typical forward chain rules ( accept wg interface to LANsubnet )
c. typical input chain rules ( accept wg interface - to allow admin to config router remotely )
d. if connection is coming from another MT router ( acting as a client with subnet X ( need ip route dst-address=subnetX gateway=wireguard interface )
AND THE BIGGIE - ALLOWED IPS.
e. Typically MT as a server has all its peers like so. ( assuming IP address on MT 10.10.10.1/24 )
peer1 allowed IP = 10.10.10.2/32 admin remote 1 ( to laptop)
peer2 allowed IP = 10.10.10.3/32 admin remote 2 (to iphone )
peer 3 allowed IP = 10.10.10.4/32,192.168.2.0/24,192.168.4.0/24 ( to remote MT client router )
I think you get the drift, for a manual setup, what is the delta between a standard mt router server (for handshake setup) and a BTH setup for same??
Are there limitations............ ??
Next post intimates that it doesnt work with different Winbox Ports??
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 04, 2024 6:12 pm
by dcavni
dcavni you seem to have a very customised device. BTH is for people that don't want to configure their devices manually at all. So BTH works best with default config. If you are able to change ports and such things, you can create BTH setup manually too :D
Not realy so much for customisation as for the security reasons i changed Winbox port, but BTH doesn't know how to work with that, so i changed it back to default. For me BTH is the most convinient way to reach device behind cg-nat. And also to connect from my phone, to use Pihole on my home network.
When i tried to connect with Wireguard app from my phone by scanning QR code in /ip cloud to HapAX Lite LTE6 behind cg-nat it doesn't work. But it works with BTH app, so i just use that, it's easier.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Jan 05, 2024 10:10 am
by normis
> Next post intimates that it doesnt work with different Winbox Ports??
only the BTH app (!) needs the default port. To set it up. We might fix that, but then again, if you have custom ports and whatnot, might as well just use winbox
> how to setup the Mikrotik manually, when using your relay point
IP > CLOUD and enable BTH. QR code and config file will be shown. When using a Wireguard app with this QR config, it will use our relay
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Jan 05, 2024 5:11 pm
by anav
> Next post intimates that it doesnt work with different Winbox Ports??
only the BTH app (!) needs the default port. To set it up. We might fix that, but then again, if you have custom ports and whatnot, might as well just use winbox
> how to setup the Mikrotik manually, when using your relay point
IP > CLOUD and enable BTH. QR code and config file will be shown. When using a Wireguard app with this QR config, it will use our relay
...
Normands, a very disappointing answer. Please provide sufficient detail and information to compose a thorough response that answer more questions than it provokes!! Pretend you are Viktors and say more not less. ;-)..
Point 1. I am assuming you mean a remote user, once the connection has been made, with BTH app, one can use the mikrotik APP on i phone or winbox on laptop to connect to the Router for configuration purposes?
Point2. Yes, if BTH also allows access to the router for config purposes. I didnt know it includes the functionality of the current MT APPS , but if it does, it appears that the BTH APP assumes the default port for winbox. If so, it needs to be modifed so that the BTH generated by the admin, contains the correct winbox port.
Point3. YOu totally missed the direction of my question. It wasnt how to setup the BTH, it was how to setup the corresponding wireguard interface.
You have NOT
1. made it clear if the MT router is still considere the Server ( for handshake ) consider the relay point as the public IP or port forward HELPER......... and thus its transparent and the Admin should configure the rest of the config as per normal as though it was Server for handshake!!
The only requirement I see NOT needed would be the input chain rule for the wireguard port as the the Router sends out a connection to the relay device (outbound) for this part, but one would still need to manually.
( RIGHT? WRONG?)
In other words WHERE AND HOW does the handshake take place??
other things I think still need to be done manually to setup the wireguard tunnel........
a. ensure IP address on router
b. allowed IPs setup on router ( typically just wg IP of remote user but if to another router, also subnets coming in or being visited)
c. extra routes for remote subnet.
d. input chain rule for remote access to config router if required
e. forward chain rule for remote access to local subnets if required
f. forward chain rule for local access to remote subnets if required.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Jan 05, 2024 5:54 pm
by Amm0
> Next post intimates that it doesnt work with different Winbox Ports??
only the BTH app (!) needs the default port. To set it up. We might fix that, but then again, if you have custom ports and whatnot, might as well just use winbox
Fair enough re non-standard winbox port. But if BTH app added MDP/LLDP/etc discovery, that solve the port problem... but more importantly potentially be "more friendly" (e.g. during on-boarding app could start with "Router found at 192.168.xx.1. Setup now?") instead of the end-user having to know the router's IP.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 1:09 pm
by normis
anav, before I answer. Have you used the BTH app and understand what it's purpose is? It enables Wireguard in router. That is all.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 1:43 pm
by anav
anav, before I answer. Have you used the BTH app and understand what it's purpose is? It enables Wireguard in router. That is all.
No, I have not set it up yet because I dont understand how it works and likely not to unless I understand the role of the router
is it a server for handshake - seems like no, and thus no input chain rule required??
is it a server in terms of how one views allowed IPs.... (lets say 3 peers, are they client devices identified by /32 or not )............
(Confusion recently added by statements of winbox ports or maybe it was wireguard ports having to be the default port, and further it auto selects wans to use??)
Think 3 clients attached to one router over BTH connections
Think 3 clients and another router attaching to one router over BTH connections.
Think 3 client and another router attached to one router over BTH connections and that single router (which 4 other sites connect to) is itself now connected to a third router as a client as the remote 3rd router has a public IP (non BTH connection).
I should be able to visualize all three scenarios and I will configure, firewall rules, allowed IPs and routes.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 2:03 pm
by dcavni
Winbox port is only needed for BTH aplication, that it can access the router and configure everything. Just like Winbox Android app does, but there you can specify port to connect to. All other traffic has nothing to do with this port afterwards.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 7:08 pm
by Amm0
anav, before I answer. Have you used the BTH app and understand what it's purpose is? It enables Wireguard in router. That is all.
BTH's main "trick" is using /ip/cloud DDNS to use a new "<sn>.vpn.mynetname.net" in the WG generated configuration (instead of an actual IP address). If you router is behind a CGNAT/non-public, the the x.vpn.mynetname.net address resolve to a Mikrotik server. If you have a public IP, BTH's DDNS name is stuff used, but /ip/cloud will resolve the x.vpn.mynetname.net to YOUR IP address, so Mikroitk isn't involved. So it's the DDNS services allows the proxy / non-proxy mode to change WITHOUT reconfiguring your remote WG peers since they use the DNS name, not an IP.
BTH 2nd trick is adding "dynamic" firewall rules for WG + BTH:
/ip/firewall/filter/print
0 D ;;; back-to-home-vpn
chain=forward action=drop src-address-list=back-to-home-lan-restricted-peers out-interface-list=LAN
1 D ;;; back-to-home-vpn
chain=input action=accept protocol=udp dst-port=19966
/ip/firewall/nat/print
0 D ;;; back-to-home-vpn
chain=srcnat action=masquerade src-address=192.168.216.0/24
Lastly, the apps simply connect via winbox, and check the "enable" box on BTH. Which you can also do directly in winbox, except in winbox you'd be responsible for cut-and-paste the pear configuration code to a normal WG client.
But to @anav's point, if WG is working and always have a public IP...there is no need to start using BTH. BTH allows the router to change mode between a public and non-public IP, WITHOUT regarding changing to WG remote peers is the key advantage. Other than easy-of-use... download app, router user/passwd, and few taps.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 7:28 pm
by anav
Now someone is finally providing useful information with which to discuss further.
a. Why does the BTH config on the MT create a firewall rule blocking remote client to local LAN interface?
b. Why does the BTH config on the MT create an input chain rule - because the router is still responsible for sending the handshake accepted back to the user via the MT Relay???
c. Does the BTH automatically select the new listening port and is that changeable by the admin?
d. I dont get the BTH automatically creating a source-nat rule on the router and an incomplete rule at that??
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 8:24 pm
by Amm0
a. Why does the BTH config on the MT create a firewall rule blocking remote client to local LAN interface?
Mine is empty. Not sure how the "back-to-home-lan-restricted-peers" address-list in firewall gets populated actually. So rule does nothing in my case.
b. Why does the BTH config on the MT create an input chain rule - because the router is still responsible for sending the handshake accepted back to the user via the MT Relay???
I'm not sure it's needed if proxied, but if you have default firewall and public IP, then the WG port does have to be allowed on "input". AFAIK it wouldn't be needed if proxied... But BTH does NOT seem to vary the dynamic firewall rules, so may just be superfluous if proxied.
c. Does the BTH automatically select the new listening port and is that changeable by the admin?
The port is calculated and NOT changeable. I'd imagine the port may be different than mine if proxied — Mikrotik's BTH proxy server does not have unlimited IP, but a lot of ports.
d. I dont get the BTH automatically creating a source-nat rule on the router and an incomplete rule at that??
The masquerade means you do NOT need routes back to any of your LANs, since they'd get NAT'ed to the router's IP by the BTH NAT masquerade rule. It could check the interface, but the IP restriction alone works.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 9:18 pm
by anav
a. Why does the BTH config on the MT create a firewall rule blocking remote client to local LAN interface?
Mine is empty. Not sure how the "back-to-home-lan-restricted-peers" address-list in firewall gets populated actually. So rule does nothing in my case.
b. Why does the BTH config on the MT create an input chain rule - because the router is still responsible for sending the handshake accepted back to the user via the MT Relay???
I'm not sure it's needed if proxied, but if you have default firewall and public IP, then the WG port does have to be allowed on "input". AFAIK it wouldn't be needed if proxied... But BTH does NOT seem to vary the dynamic firewall rules, so may just be superfluous if proxied.
c. Does the BTH automatically select the new listening port and is that changeable by the admin?
The port is calculated and NOT changeable. I'd imagine the port may be different than mine if proxied — Mikrotik's BTH proxy server does not have unlimited IP, but a lot of ports.
d. I dont get the BTH automatically creating a source-nat rule on the router and an incomplete rule at that??
The masquerade means you do NOT need routes back to any of your LANs, since they'd get NAT'ed to the router's IP by the BTH NAT masquerade rule. It could check the interface, but the IP restriction alone works.
SMALL PROGRESS.
a. The firewall rule is not automatically created on the non public IP MT ROUTER or is it, since yours is empty??
b. So your intimating that its the MT proxy WG server that returns the handshake back to client and not the non-public IP and thus i nput chain rule is NOT required.
c. Masquerade rule is ON THE ROUTER or on the PROXY server???? STILL MAKES ZERO SENSE.
Which out interface is noted?? I see none, what is the significance of the address, there which address is it..........
Which direction aka from which device are we source natting.................
d. Understand it makes sense that the MT proxy wireguard server chooses the port or at least the IP DNS CLOUD enabling does or some combo thereof, just good enough to know its not the admin that selects the listening port.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 09, 2024 10:53 pm
by Amm0
SMALL PROGRESS.
a. The firewall rule is not automatically created on the non public IP MT ROUTER or is it, since yours is empty??
The IP firewall filter is there regardless (7.14beta4) – it's the address-list that is empty. No address, "forward" rule doesn't hit.
b. So your intimating that it's the MT proxy WG server that returns the handshake back to client and not the non-public IP and thus i nput chain rule is NOT required.
Correct, in the proxy case, should not be needed. But you can't remove, so dunno for sure. In the direct connection method, the port is still random I believe, so dynamic input filter rule make sense.
c. Masquerade rule is ON THE ROUTER or on the PROXY server???? STILL MAKES ZERO SENSE.
On your router is where masquerade happens. It essentially
hide the BTH IP address from the rest of the network, which allow
everything to be reachable via your router to the BTH client app. It's a dirty/easy trick to use the router IP for BTH/WG peer traffic. But...in the "always VLAN" model, with firewall protections...this approach would be sacrilegious.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 8:29 am
by normis
Instead of trying it yourself, you want somebody to do all the work and show you each step. That is lazy
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 8:32 am
by normis
Not sure how the "back-to-home-lan-restricted-peers" address-list in firewall gets populated actually.
This is a new feature, when you have your own BTH connection, you can make a shared connection for your friend. For this friend you can add a checkbox in the app, that only allows the friend to go to internet, but not see your LAN.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 8:53 am
by dcavni
That is a nice possibility.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 11:56 am
by nichky
back-to-home-lan-restricted-peers -is that existing?
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 12:21 pm
by normis
It is an address list, that is by default empty / not existing. If you add a shared user and specify "block LAN", then his tunnel IP will be added into that address list and LAN acess will be blocked
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 12:37 pm
by nichky
ok , it looks interesting and useful , we are waiting for that
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 4:14 pm
by mszru
For this friend you can add a checkbox in the app, that only allows the friend to go to internet, but not see your LAN.
If the intention is to provide access to the Internet only, then I would name this option accordingly. Changing LAN to !WAN in that firewall rule will make it more generic and applicable to configurations slightly different from standard like mine.
I extended standard config with GUEST and IOT interface lists and the current rule won't block forwards to guests or IoT devices.
I realize that BTH's target audience is mostly home users with standard configuration, but changing LAN to !WAN won't make any difference for them.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 10, 2024 6:48 pm
by anav
Being of the drop all ilk at end of chains, I would prefer
forward accept source-address=list=xxx out-interface-list=WAN disabled
forward accept source-address-list=xxx out-interface-list=LAN disabled
and let the admin decide if the users need one or the other or both.
one could argue EQUALLY that purpose of the partial attempt by MT is to ensure:
either admins can let folks access to internet
OR
admins can let folks access to servers
Blocking either one and permitting the other is hit and miss and makes TOO much of an assumption either way!.
The proper security approach is to disable both and have the admin enable manually when back at the router config aka to match what is required.......
OR add the choices to the app setup somehow, as oh user Johnny needs X, will choose ........
Anything more probably too complex, anything less misses the boat and fails to capture the majority of needs.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 17, 2024 8:15 pm
by makoloved
I need to ask!
If I need to applied the new vpn "back to home"
And I don't have public ip address that mean can I setup BTH? and can access to my Router from remotly?
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 17, 2024 8:25 pm
by holvoetn
Short answer: yes.
Long answer: see short answer.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Jan 17, 2024 8:34 pm
by gigabyte091
If im not wrong if you have public IP then BTH will not use mikrotik relay server but your public IP instead.
Ofcourse you need to have router that supports BTH (arm,arm64,tile if im not wrong)
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 1:48 am
by Amm0
If im not wrong if you have public IP then BTH will not use mikrotik relay server but your public IP instead.
Correct. If you have a public IP and thus NOT using the relay, under /ip/cloud "BTH VPN", it will show "reachable directly (region: ... ip:... rtt: 59.581ms)" next to "VPN Relay IPv4 Status".
If it using the relay/proxy via Mikrotik's servers, the same setting will show: "reachable via relay" instead.
I don't know how often it checks, but it will switch modes if your config changes from having reachable port for WG (e.g. if the default route changes from a public IP to a CGNAT/etc.). I haven't extensively tested it, but this automatic selection could be handy if you a "normal" internet connection with public IP and say an LTE backup (which likely does not have a public IP). The WG clients don't care since they use DNS name, and depending on the mode, the DNS resolve to your public IP or Mikrotik's proxy depending on the BTH status.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 9:46 am
by normis
The BTH is not only helpful because of the relay server*, but also because it makes setting up a strong and secure VPN a simple task for beginners. We have seen people who simply disable firewall rules, to allow Winbox access from their workplace, for example. For beginners - just use BTH
* - fun fact for technical people, in latest versions BTH actually has three modes of operation. 1) Direct 2) via the relay server 3) using hole punching. this means relay only helps to find both ends, but traffic will go direct.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 3:07 pm
by Amm0
3) using hole punching. this means relay only helps to find both ends, but traffic will go direct.
I guess now I have questions...
Under what conditions does it use hole punching?
Does that require the BTH app, or can a normal WG use "hole punched" BTH too?
Basically I cannot picture how hole punching would work with WG (and not in the docs)
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 3:49 pm
by anav
3) using hole punching. this means relay only helps to find both ends, but traffic will go direct.
I guess now I have questions...
Under what conditions does it use hole punching?
Does that require the BTH app, or can a normal WG use "hole punched" BTH too?
Basically I cannot picture how hole punching would work with WG (and not in the docs)
Concur with questions AMMO. A technical paper would be highly appreciated. MT is doing some neat sheite with wireguard but its tantalizingly out of my grasp of comprehending to the degree to what I would like. Its funny it took them so long to fix the lost comms with WG server issue but at least they didnt stop there and have really made an effort to give us more functionality.
The HEX is not a discontinued product and will be around for a while, heck its my favorite managed switch! and giving it BTH would actually be responding the the many basic users needs ( the ones with less knowledge, and on a budget using MT. Hopefully Mips BTH will be forthcoming.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 3:54 pm
by anav
Basically I cannot picture how hole punching would work with WG (and not in the docs)
This especially. How would the cloud instance create a hole to two entities that have no public IP aka CGNAT, then faciliate a direct connection without relay???
Perhaps MT has discovered true magic. :-)
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 9:00 pm
by mszru
Basically I cannot picture how hole punching would work with WG (and not in the docs)
How would the cloud instance create a hole to two entities that have no public IP...???
The hole is punched by the router itself when making an outgoing UDP connection to the MikroTik Cloud. The "connection" object will be kept alive until the UDP timeout is reached. And while it's alive the UDP packets can be received to the opened "hole" in the ISP's firewall and NATed back to BTH client at the router.
When such outgoing connections are made by the router's BTH client and the iOS/Android BTH client, some unique identifier (e.g. router's serial no) must be passed to the MikroTik cloud. This identifier will help the BTH service in the cloud to logically link these 2 connections.
Then the BTH service tells both clients to use their ISP public addresses for establishing direct WireGuard connection using the "holes" on both ends.
I hope my understanding is not far from the truth.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 11:08 pm
by anav
Not a bad improvisation! I am still curious as there has not really been a handshake at all, just two clients somehow connected and maintaining a connection. I wonder what the underlying virtual structure laid down looks like. Also what happens when one end loses communications? In a typical lost comms scenario, the client peer will continue to attempt to c connect with keep alive.
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Jan 18, 2024 11:16 pm
by Amm0
When such outgoing connections are made by the router's BTH client and the iOS/Android BTH client, some unique identifier (e.g. router's serial no) must be passed to the MikroTik cloud. This identifier will help the BTH service in the cloud to logically link these 2 connections.
I can see how the BTH iOS/Android app could do this, since port might need changing. But I'm not sure it be possible when use a standard WG client. But dunno.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Jan 19, 2024 5:35 pm
by foraster
I've been using Wireguard on my main router, an hEX (mmips) for some time, running great. To the point of being sure to shut down my openvpn server.
Sometimes the main connection is down and the backup is behing a CGNAT, so I needed a solution for this puntual cases.
I read the BTH uses wireguard, so what's the point of not supporting other architectures like mmips, taking into account the huge number of devices out there?
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Jan 20, 2024 7:00 pm
by anav
so what's the point of not supporting other architectures like mmips, taking into account the huge number of devices out there?
Business Decisions:
LIST OF POTENTIAL ACTION ITEMS
BUDGET AVAILABLE THIS YEAR
PRIORITIZED LISTS
weighting factors
- which devices can gain functionality without hardware changes ( memory/cpu capacity throughput )
- development cost - lab resources
- personnel costs - coders
- testing costs - regress test, independent testers
SCHEDULE:
- time available this budget year AFTER all new product development on-going
- time available this budget year AFTER current RoS Beta work
- time available this budget year AFTER any other RoS work ( eg. waiting for long-term stable vers7)
HARDWARE ROADMAP:
- time left before EOL
- new products being released or on horizon to replace EOL hardware or address now areas.
OPERATING EXPENSES:
- raises for personnel except Normands until he gets on board with better First Posting Process.
COMPANY PLANNING
- privately owned by two people, not public, so they decide how much profit they desire ( thus determines spending on hardware, software etc. )
- future projections ( market assessments etc), play a large role in the directions a company takes.
+++++++++++++++++++++
What does not come into play.
Individual posters miffed about missing functionality including myself :-)
How to rectify.
Convince a billionaire business person to request 6 figure worth of product if it has X functionality, may gain some traction.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 30, 2024 1:15 am
by JimKusz
Although latency is pretty bad if relayed, things do route/connect. I see ping times in the 600-800ms range using BTH with relay from phone to router. This router also has ZeroTier, so if disconnect from BTH and use ZT as VPN instead, latency is about 150-250ms in same ping test. I'd imagine difference is ZT roots are closer than Latvia...not that ZeroTier is inherently faster, just way closer in proximity to California.
Zerotier generally tries to NOT directly relay through their servers; instead, they use the servers to "punch holes" through nat so that a direct connection can be established, and ZT is not in the data plane of the feed. Relays are an absolute last resort with ZT. Normally your latency and throughput drops notably if you have to relay through ZT. The NAT hole-punching is really quite amazing on ZT...
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 30, 2024 6:53 am
by MTL7
I’ve read the BTH manual but cannot find any information regarding the required rights for the user account that you would login with at the BTH iOS mobile app. Pls share information on this. I suppose we should not use the router’s admin account to login from the BTH iOS app. Thx.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 30, 2024 9:32 am
by normis
Depending on the type of actions you want to perform.
When BTH creates a new tunnel - BTH app creates and deletes all kinds of configuration in the router, so yes, it needs full admin rights to do that.
When sharing the already created tunnel (as admin) to another person, that only needs to use the VPN, there is no need for a router user at all. Only the created tunnnel is used, the app does not connect to router administration facilities in this case.
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Jan 30, 2024 9:34 am
by normis
Although latency is pretty bad if relayed, things do route/connect. I see ping times in the 600-800ms range using BTH with relay from phone to router. This router also has ZeroTier, so if disconnect from BTH and use ZT as VPN instead, latency is about 150-250ms in same ping test. I'd imagine difference is ZT roots are closer than Latvia...not that ZeroTier is inherently faster, just way closer in proximity to California.
Zerotier generally tries to NOT directly relay through their servers; instead, they use the servers to "punch holes" through nat so that a direct connection can be established, and ZT is not in the data plane of the feed. Relays are an absolute last resort with ZT. Normally your latency and throughput drops notably if you have to relay through ZT. The NAT hole-punching is really quite amazing on ZT...
BTH basically does all the same things. Direct connection first, if that does not work, it tries hole punching (on android currently), if that does not work, only then it goes through our relays. Currently we only have relays in EU and US, but more are coming.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:07 pm
by dcavni
Not sure how the "back-to-home-lan-restricted-peers" address-list in firewall gets populated actually.
This is a new feature, when you have your own BTH connection, you can make a shared connection for your friend. For this friend you can add a checkbox in the app, that only allows the friend to go to internet, but not see your LAN.
How can someone find this checkbox? I select new share and below it just says "acess to home network" "acess to internet" and in new share settings i can only select when in expires, use router DNS and Allowed IPs.
Version 0.24
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:15 pm
by normis
acess to home network" "acess to internet"
you just described it yourself.
what is the question?
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:43 pm
by dcavni
There is no option to add a checkmark.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:46 pm
by normis
You are looking at status icons for existing users.
When you make a NEW share for your wife or friend, this selector will be available
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:52 pm
by dcavni
Where? Maybe i should try to delete this BTH profile for device again and start over. It helped last time, when options ware missing.
Edit: Nope i tried and i still don't see this option. 5009 is on 7.13.2
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:56 pm
by normis
Looks like your RouterOS is not running the latest version. Make sure you are up to date.
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:57 pm
by dcavni
It's 7.13.2. Is this only available in beta?
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:58 pm
by normis
Yes, since 7.14
Re: NEW FEATURE: Back to Home VPN
Posted: Wed Feb 07, 2024 1:59 pm
by dcavni
Ok, thanks for clarification Normis. I thought that i simply became extremly stupid in the meantime because i couldn't find this option anywhere.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Feb 09, 2024 4:51 pm
by krafg
Quick question: BTH will be compatible with LtAP + LTE connection behind NAT?
Thanks ans regards.
Re: NEW FEATURE: Back to Home VPN
Posted: Fri Mar 01, 2024 1:28 pm
by zax
I've been using Wireguard on my main router, an hEX (mmips) for some time, running great. (...)
(...) so what's the point of not supporting other architectures like mmips, taking into account the huge number of devices out there?
Its unbelievable, they have Wireguard already implemented on mmips. mmips devices, such as hEX are probably their most sold devices ever...
then they randomly decided not to support mmips, for reasons.
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Mar 09, 2024 5:23 pm
by dcavni
In latest version on 5009 log is full of this messages: back-to-home-vpn: QXJZkH4qn5A***************************=: Handshake for peer did not complete after 5 seconds, retrying (try 2)
and after some time Handshake for peer did not complete after 20 attempts, giving up, but it keeps on populating the log with theese messages.
When i'm connected with Android phone (BTH app) there are no log messages.
Already i tried with disabling BTH, deleting configuration from phone, but issue keeps repeating.
Is this normal behaviour?
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Mar 09, 2024 5:33 pm
by holvoetn
Supposedly fixed in 7.15beta6.
There is also a workaround if you modify the logging rules to numb down those messages but in my book these shouldn't even be displayed (it's debug, not info)
Re: NEW FEATURE: Back to Home VPN
Posted: Sat Mar 09, 2024 5:40 pm
by dcavni
Supposedly fixed in 7.15beta6.
There is also a workaround if you modify the logging rules to numb down those messages but in my book these shouldn't even be displayed (it's debug, not info)
I was thinking the same, this does not even need to be in the log. I disabled Wireguard logging with !wireguard for now. I rather wait for a more stable 7.15 version. Thank you for temporary solution.
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Mar 10, 2024 4:00 am
by nichky
why i cant see the following rule on my firewall?
I got BTH enabled on v7.14
ip/firewall/filter/print
0 D ;;; back-to-home-vpn
chain=forward action=drop src-address-list=back-to-home-lan-restricted-peers out-interface-list=LAN
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Mar 11, 2024 1:19 pm
by sflores
Supposedly fixed in 7.15beta6.
There is also a workaround if you modify the logging rules to numb down those messages but in my book these shouldn't even be displayed (it's debug, not info)
I was thinking the same, this does not even need to be in the log. I disabled Wireguard logging with !wireguard for now. I rather wait for a more stable 7.15 version. Thank you for temporary solution.
Version 7.14.1 is supposed to fix this problem:
*) wireguard - do not attempt to connect to peer without specified endpoint-address;
Something has been fixed. With version 7.14, "ghost" TX packets appeared in the BTH interface:
Captura de pantalla 2024-03-03 a las 12.45.53.png
And now that TX traffic has disappeared:
Captura de pantalla 2024-03-11 a las 11.57.19.png
But, unfortunately, those annoying logs are still shown in the BTH interface:
Captura de pantalla 2024-03-11 a las 11.58.29.png
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Mar 11, 2024 8:14 pm
by diamuxin
Idem...
With the latest update 7.14.1 the logging problems with the handshake have NOT been solved, both in the wireguard road-warrior links and with BTH.
BR.
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Mar 31, 2024 8:07 pm
by MrBonding
Idem...
With the latest update 7.14.1 the logging problems with the handshake have NOT been solved, both in the wireguard road-warrior links and with BTH.
BR.
Still same bug on 7.14.2
Re: NEW FEATURE: Back to Home VPN
Posted: Mon Apr 08, 2024 11:49 pm
by aaronk6
Is anyone using BTH with the WireGuard app on iOS, specifically with the on-demand setting enabled? I aim to have the VPN connection establish automatically when I'm away from my home WiFi (for which I've configured the SSID in the WireGuard profile). It seems the BTH app doesn't support this, so I imported the BTH WireGuard configuration from my router into the WireGuard app on my iPhone and made the following adjustments:
- Set DNS to my local DNS server at 192.168.88.1 to resolve local domain names.
- Replaced 0.0.0.0/0,::/0 with 192.168.88.0/24 to ensure only connections to my home network are tunneled.
This setup mostly works, but the connection doesn’t establish or disconnect on-demand as expected.
However, if I remove the
*.sn.mynetname.net peer from the config (which has
AllowedIPs set to
0.0.0.0/32 and a weird public key of
//////////////////////////////////////////8=), it works as intended.
It works whether my home router has a public address or is on LTE behind CGNAT.
Could someone shed light on the purpose of the
*.sn.mynetname.net peer and the
0.0.0.0/32, and what I might be losing by removing it?
Re: NEW FEATURE: Back to Home VPN
Posted: Tue Apr 09, 2024 8:59 pm
by diamuxin
With the latest beta (7.15beta9), I now get this new message all the time when disconnecting (peer with resolver checked)
back-to-home-vpn: [peer19] CHWCHPuLuweWVZkq3r2HynUP59yxk3GsMX4i9XamAQw=: Handshake for peer did not complete after 20 attempts, giving up
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Apr 11, 2024 12:15 am
by anav
Is BTH programming, interfering with normal wireguard use? BUG?
Unable to successfully mangle traffic coming in on WAN2, back out WAN2 for wireguard handshake, when WAN1 is a primary WAN.
Return traffic appears to be sent out WAN1 instead, iaw connection-tracking and inability to access config from remote user.
All other traffic to the router (directed at WAN2) is captured by mangles and routed out WAN2 as expected (via table, and additional IP route)
(keep alive deselected to rule out that functionality).
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Apr 18, 2024 1:33 am
by Techknow
Re: NEW FEATURE: Back to Home VPN
Posted: Thu Apr 18, 2024 6:07 am
by nichky
pretty sure that you added this on wrong topic
Re: NEW FEATURE: Back to Home VPN
Posted: Sun Apr 21, 2024 7:18 pm
by petardo
Hi,
I noticed that all of our MTs get 192.168.216.1 wg address.
Is it always the same? Can we count on it?