-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenVPN Client (As a Gateway) Connection Issues 18.7.10 -> 19.1.x #3381
Comments
|
I did notice that the VPN Server tries to push these options on to OPNSense Client: openvpn[22479]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.43.1.1,topology net30,ifconfig 10.43.1.10 10.43.1.9,auth-token'
|
|
Per mimugmail:
I messed with these outbound nat rules quite a bit during troubleshooting... it is longer that I normally would have it. I took a comparison of routing table on a 18.7.10 config vs 19.1.4: Then I did the TCPDump... I think I can kind of see what is happening. It looks like the firewall itself is trying to submit the pings on 19.1.4. Since the hostname of the firewall is shown on the dump. |
|
Please consider closing the the issue here and go back to forums. IMHO this is not a bug, even more a constellation which should also not work with 18.7. Your first 2 NAT rules doesn't make sense as you want to NAT LAN connections to your PIA IF IP .. but the first NAT your PIA IP to OpenVPN IP which will break if you configure a second client config or a server config. |
I am aware. That was me testing and messing around as I noted. No matter what was in outbound or the order, it wasn't working. I never had the OpenVPN one in there previously. It isn't in there now but was when I took the screenshot. I even switched the entire thing from hybrid to manual since that post and manually made all the normal WAN rules. I made copies of my VMWare instance for testing, to not modify my "production" firewall. |
|
This is what my active/production FW manual outbound NAT rules look like on 18.7.10 I imported this entire config into 19.1.4 and the VPN gateway could not connect anywhere. (WAN Gateway worked perfectly)... Which is why I really think there is a bug somewhere. I have been using this OpenVPN Client setup since I started using OPNSense 2 years ago, all of a sudden it is an issue. My Firewall has:
|
|
New 19.1.5_1 Update: TCPDump... it looks like the connection is working now in 19.1.5, but there is another issue present. The OpenVPN Client connection keeps reloading every 10-15 seconds. You can see by the IP address changing for the source in the TCPDump. Now I just need to get it stable and to stay connected. OpenVPN Client Log:
|
|
System Log: Apr 5 19:13:14 kernel: ovpnc2: link state changed to DOWN Apr 5 19:13:06 kernel: ovpnc2: link state changed to DOWN Apr 5 19:12:57 kernel: ovpnc2: link state changed to DOWN |
|
Second device using same credentials? |
Yes, and what's odd. It is like it is still an outbound issue. However, having both in there isn't working in 19.x vs 18.7. Which is why I still think there is a bug somewhere to begin with. |
|
Will this be fixed in some future release? |
|
As of now this is a support case. We don't know what to "fix". |
I think it may be a firewall rule issue with the pf firewall sending traffic over the proper gateway. It only works if all the outbound rules are deleted for regular WAN connections and only the VPN ones are left. The issue is probably something that is behind the scenes and probably hidden with another issue. I am starting to think I need to try manual policy based routing rules, if there are any suggestions. Just makes no sense at all that a OpenVPN config from when I started with OPNsense in 2017, suddenly breaks in 19.1 and worked perfect in every other OPNSense version since then. |
I do not think this is necessarily true. We have more upcoming changes in 19.7 for behavioural changes that will require manual intervention -- ease of use features that have complicated the integration in an unnecessary way that is error prone now or in the future. We are happy to add any of these into migration notes but that requires widespread use of the "broken idiom" for deploying OpenVPN which I'm not aware we have documented on docs.opnsense.org or may be a side effect of multi WAN which easily eludes the scope of "OpenVPN broke" because it did in fact not. You will find that I am personally weary of "it doesn't work anymore" battle cry for community support with hundreds of occasions where the status quo is a lot better off now than it was 6 months ago, 1 year ago, 2 years ago, or even 4 years ago. :) Cheers, |
|
I made a try with the new version 19.7. By the way, good job! The update went without problems! In the old version, an outbound NAT rule was created. The rule looks like this: What I noticed while experimenting: Therefore my question: Is it possible that Opnsense detects the traffic that should go over the VPN not as traffic from the OVPN interface, but as traffic from the WAN interface? (The VPN connection is established via the WAN interface...)P.S.: Cheers. |
|
This should be fixed in 19.7.3, If all fails you can always use manual nat |
|
I am already using version 19.7.3 (Release Type Production) an there are no pending updates listed. And I use Manual outbound NAT rule generation (no automatic rules are being generated). |
|
@smokydragon can you open a thread in forums, this is a usual support question and should be easy to handle with some screenshots. |
|
@DanMc85 19.7.3 should mostly eliminate all of your issues, can you check with latest version (making a backup before) if this issue can be closed? |
|
@mimugmail thanks for your answer, I'll create a thread in forums. |
|
Closing as per https://github.com/opnsense/core/blob/master/CONTRIBUTING.md |

RE: https://forum.opnsense.org/index.php?topic=12281.0
There are issues with utilizing an OpenVPN client in a multi-gateway setup (not redirecting all traffic) on any 19.1.x build of OPNSense.
I have tried both a clean reinstall/rebuild and the usual upgrade with existing configuration with same result. There is a bug somewhere.
So here is my basic setup...
I have a VLAN 100 on my LAN... any device in this subnet goes out a Private Internet Access VPN Client GATEWAY that is running on OPNSense as a client. Others do this with a simple Alias for specific devices, regardless the principal setup is the same.
So from what I can tell on any build of 19.1.x (tried them all) and currently 19.1.4 this setup stops working.
Here is what I can see so far:
Somehow something is broken somewhere. If I go to ping interface diagnostics, chose the VLAN 100 or Private Internet Access Interfaces. Ping any address. It fails.
On the home screen dashboard, dpinger shows the gateway as down/offline. VPN connection is up perfectly.
I feel this is an outbound NAT issue, but I am not sure where to dig deeper for troubleshooting other than modifying NAT rules, firewall rules, etc... which I have already played around with.
Reference Topics:
https://forum.opnsense.org/index.php?topic=4979.msg52493#msg52493
https://forum.opnsense.org/index.php?topic=11843.msg53785#msg53785
https://blog.networkprofile.org/pia-vpn-on-pfsense-2-4-4/
The text was updated successfully, but these errors were encountered: