[Bug 207831] r293159 breaks OpenVPN routing
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Thu Jun 2 22:08:03 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207831
--- Comment #8 from guyyur at gmail.com ---
Oliver,
Did you try to connect with more than one openvpn client?
For me the problem was only seen when the second client tried to connect.
The first client got the address assigned to the remote side of the tunnel
and there is a correct route for it.
The second client got an address that required using the /24 route which
incorrectly leads to lo0.
Bad route for 192.168.170.0/24 with r293159:
# netstat -rnf inet | grep -e Destination -e 192.168.170
Destination Gateway Flags Netif Expire
192.168.170.0/24 192.168.170.1 UGS lo0
192.168.170.1 link#4 UHS lo0
192.168.170.2 link#4 UH tun0
Good route for 192.168.170.0/24 with r293159 rtsock.c changes reverted:
# netstat -rnf inet | grep -e Destination -e 192.168.170
Destination Gateway Flags Netif Expire
192.168.170.0/24 192.168.170.1 UGS tun0
192.168.170.1 link#4 UHS lo0
192.168.170.2 link#4 UH tun0
# ifconfig tun0 inet
tun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
options=80000<LINKSTATE>
inet 192.168.170.1 --> 192.168.170.2 netmask 0xffffff00
Opened by PID 671
You can also manually create the tunnel and route to compare 10.3-RELEASE to
11-CURRENT:
ifconfig tun0 create
ifconfig tun0 192.168.170.1 192.168.170.2 mtu 1500 netmask 255.255.255.0 up
route add -net 192.168.170.0 192.168.170.1 255.255.255.0
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the freebsd-amd64
mailing list