-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Gateway groups and NAT : Incorrect NAT IP used on interface when Shared Forwarding is enabled #2376
Comments
|
no work would be boring :) let me see how we could debug this further.... |
|
Please don't hate on me for bringing shared forwarding up again :} This fellow has an issue that could be related, too: https://forum.opnsense.org/index.php?topic=7860 Some notes with less scientific insight that might give some clues:
or If I find more relevant, verifiable information I will update again. |
|
Well hello :} This probably won't make it to 18.7 eh? The reason I'm asking is because I think this here (https://forum.opnsense.org/index.php?topic=8786.0) could be related to the same issue. This guy (https://forum.opnsense.org/index.php?topic=7860) also reported disabling sticky fixes his issue. |
|
@namezero111111 hello, let's take a stab at this... Sticky outbound NAT disable "helps" with this --- this is still true? That's a good place to start. |
|
@namezero111111 also, does this happen all the time or do some connections work fine? like 50% ok and %50 not ok? |
|
Yes, disabling sticky will bypass/"resolve" this. Source tracking timeout seems to have no effect on this *. The initial connection(s) "work", since data is actually being transferred, and as long as there is an active association (presumably before the last association for the client expires) there is no problem. I will run some tests tomorrow to see if there is something more deterministic about it. Should I try with 18.1 or would you prefer the 18.7 dev version? |
|
I can't test this very well but I found a candidate. opnsense/src@6aad8285a4 It unlikely to panic but I also can't vouch for not making it worse that it was. Can provide this as a test kernel. |
|
Whoopsie, better patch at opnsense/src@ddb08b18 |
|
Absolutely i have a test environment still set up for this!
|
|
Perfect, kernel update via: Cheers, |
|
Juat to update, I somehow couldn't reproduce this today on the same test system. I had this before; I'll keep trying and then try the new kernel
Sent from Touch. Excuse terseness.
…________________________________
Od: Franco Fichtner <notifications@github.com>
Wysłano: wtorek, 19 czerwca 2018 21:42
Do: opnsense/core
DW: Andreas M. Iwanowski; Mention
Temat: Re: [opnsense/core] Gateway groups and NAT : Incorrect NAT IP used on interface when Shared Forwarding is enabled (#2376)
Whoopsie, better patch at opnsense/src@ddb08b1<opnsense/src@ddb08b18>
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub<#2376 (comment)>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AA9kBrgBximX_vLIwYlOVgiob3or0S3gks5t-VQZgaJpZM4TjL5u>.
|
|
Franco, I am sorry to report that for the life of me I cannot reproduce this on the original test system I used to report this. If nothing has changed on the kernel, there must be another variable at play here. Currently I cannot think of anything else to try. |
|
Fwiw, the patched kernel does no harm in that regard either :/ |
|
@namezero111111 do you have any news or should we close this ticket? |
|
@fichtner Edit: |
|
Ok, you know where to find me. Thanks for all your help! :) |
|
Dear all, Just to make it short - I configured 2 WAN interfaces (VLAN) according to wiki. I have the same problems as mentioned above and they disappear
How can I help to analyze the problem and find a patch? |
|
Disable Force Gateway in Firewall : Settings : Advanced enabled?
Malunke <notifications@github.com> schrieb am So., 28. Apr. 2019, 19:52:
… Dear all,
it seems, I have the same issue on opnsense 19.1.6.
Just to make it short - I configured 2 WAN interfaces (VLAN) according to
wiki.
I have the same problems as mentioned above and they disappear
- when unplug Gateway 1 (unplug from switch)
or
- when unplug Gateway 2
or
- when disabling sticky connections.
How can I help to analyze the problem and find a patch?
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#2376 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AE355INTEGUF3DMQ34Y3N6DPSXP7DANCNFSM4E4MXZXA>
.
|
|
Please enable and retry
Malunke <notifications@github.com> schrieb am So., 28. Apr. 2019, 20:04:
… [image: ForceGateway]
<https://user-images.githubusercontent.com/22231986/56868305-d948b880-69f0-11e9-9406-1e1078b9bba6.PNG>
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#2376 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AE355IPCZYSPBIIV5NA57LDPSXRLZANCNFSM4E4MXZXA>
.
|
|
Oh joy if this rears it head again. |
|
In particular, I'd say if disabling shared forwarding fixes it please use this workaround. In general if such a bug is encountered there's a lot that needs to be reported in order to make any sense of the setup at hand: firewall rules with policy, gateway group settings, IPv4 or IPv6 evaluated separately, switch conditions. |
|
Oh and also aux functionality used that is supposed to be addressed by shared forwarding: captive portal, traffic shaping, transparent web proxy use. |
|
It seems, that disabling shared forwarding won't help. I try to provide logs as mentioned by namezero. |
|
Gateway 1 is offline because I unplugged it :-) |
|
Yes, I have also these NAT issues. A packet-log shows for example the following entries on Interface V200: 17:54:24.284702 IP 10.28.253.3.25721 > 54.243.161.26.443: tcp 1 The IP 10.4.0.143 belongs to interface V201 - so it seems it is exactly the same issue as described by namezero111111 Please fix this issue. I will assist with troubleshooting, just tell me, what you need. |
|
It seems, disabling shared forwarding will reduce the problem (I could not determine it after short test any more) When disabling sticky connections everything works fine (the right traffic leaves the right interface) - but I will get problems with online sessions (after login on websites). Please help - you can also open a new ticket instead of using this old one |
|
We have **sticky connections **off and shared forwarding on (we need it for shaping). The session-aware problem was solved by redirecting different clients through different gateway groups configured as failover rather than load balancing (Gateways on different tiers). I could not recreate this with an imported config on a test system no matter how I tried to provoke it - it seemed sticky was working then, too - (see_ comment from Aug 9th 2018), so I assumed some unknown circumstance changed. |
|
Thanks for your answer, but I need sticky connections and want to use load balancing. Question to the fichtner and the other members - do I have to open a separate bug report rahter than following this one to get help and the Bug re-opened again? Okay - in my case it is Gateway-Group and sticky connection which causes the problem. |
If this is true (your post from 2019-04-28) then we had been down the wrong route all along or you're experiencing this under different circumstances. Did you verify this after a reboot? Just in case some stale connections or whatever are hanging around. Sure you can do it on the fly but conditionally disabling and enabling kernel firewall code at runtime raises a flag with me nonetheless. Disabling shared forwarding should fix this because it disables the glue code between pf and ipfw. |
|
I checked the last days. I have now enabled sticky connections and disabled shared forwarding. It seems to work. I set the above settings and rebooted the firewall. I also can confirm the bug exists with sticky connections on and shared forwarding on. I hope, this issue will be fixed in the next release? Thanks a lot. |
Good morning, I am afraid there may be another issue related to shared forwarding and MultiWAN. The original issue was posted here: https://forum.opnsense.org/index.php?topic=7803.0
Essentially, packets are sent out one interface originating from the IP of another.
The issue occurs regardless of:
The issue does NOT occur if:
The text was updated successfully, but these errors were encountered: