-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WAN_DHCP6 gateway fails in certain multi WAN setups #3604
Comments
|
You should be able to choose freely between gateways, the overview page should be ordered according to real priority now. (if no It would be good to have some additional documentation, but unfortunately we haven't found the time yet to write an extra doc for this. |
|
Well, the issue is - it’s not working. And with 19.7.1, WAN_DHCP6 is even removed from the list, so no chance anymore to configure it...
… Am 27.07.2019 um 20:25 schrieb Ad Schellevis ***@***.***>:
default is called upstream now, which is evaluated in combination with priority.
You should be able to choose freely between gateways, the overview page should be ordered according to real priority now. (if no upstream is found, it considers non upstream as well, but always values upstream higher in priority)
It would be good to have some additional documentation, but unfortunately we haven't found the time yet to write an extra doc for this.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub <#3604?email_source=notifications&email_token=AE4M6E5EUF3MX5725PBDN4DQBSHITA5CNFSM4IHJ6BZ2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOD26QJWI#issuecomment-515704025>, or mute the thread <https://github.com/notifications/unsubscribe-auth/AE4M6E744SZQCK62HT56EUTQBSHITANCNFSM4IHJ6BZQ>.
|
|
Hi again, I believe the label "support" is not correct. This is clearly a bug. Please let me know how I can help to solve it (log excerpts, other testing etc...). Thanks! |
|
I played a bit more with it. Giving priority works only on ipv4. Setting upstream and/or (lower) priority when wan1ipv6gw is marked as 'down' does nothing. Leaving this setting and reenabling interface gives same 'nothing'-effect. Trying the other way round with settings on wan2ipv6gw does again nothing. Btw. multiwan loadbalancing breaks with 3 upstreams on tier1, it then uses randomly only 2 of 3 upstreams regardless of the weight-setting. Even weight 3x5 does nothing. |
|
The issue is also in IPv4 when trying to assign gateways to dns servers. |
|
If there is an issue, first question is, what does the A lot of issues are related to misconfigured gateway monitoring, if the status overview shows its down, it's not a valid target to use for gateway switching. |
|
Gateway switching is off, but I tried many iterations of different settings combinations with it being on also - didn't make any difference. |
|
@RehaagJ if it doesn't show the interface it doesn't consider it a valid alternative, which is slightly different than 19.1.x, which could show unusable gateways as well. In this case it's likely an issue with the interface configuration, can you check the following on a console (and paste the output): Then for all files returned, check the contents, if the interface gateway is there. |
|
Here's the output: What you say about the WAN_DHCP6 gateway being considered invalid makes sense. So the question is: Why would it be considered invalid? |
|
It seems that your interface didn't receive a gateway (and thus misses a XXX_defaultgwv6 file), can you post your interface configuration page? maybe there are some clues in there. The gateway page itself seems to be doing the right thing here. |
|
You probably have to check the logging when connecting to dhcpv6, if I'm not mistaken, the rtsold script should write the gateway after a successful lease (using /var/etc/rtsold_*.sh). If the interface itself has received a correct address, it might also be a provider specific thing, it doesn't look related to gateway switching. |
|
This is the case where SOLICIT is sent directly because the ISP doesn't offer a router for radvd, hence no GW file. |
|
OK. Since this worked fine until 19.1.10 with the same configuration: There probably never was a GW file then, but still it was possible to configure and use the gateway. Apparently, the new gateway handling relies on the GW files now. Understood correctly? |
|
We should generate the gateway from dhcp6c as well if radvd doesn't fly. I've already promised to look into it elsewhere. |
|
@RehaagJ I said core/src/opnsense/mvc/app/library/OPNsense/Routing/Gateways.php Lines 190 to 255 in 2ff5ec4
|
|
I used the patch, rebooted and activated DHCPv6 on wan2 again. Nothing changed, GW of wan2 is still priorized, regardless of the lower prio-number and wan1gwv6 shown as dead. But after some minutes, I could'nt access webif anymore. Reboot doesn't help, dmesg didn't show anything. Funny thing ist, not even offline by force does activate wan1ipv6gw: Again, only deactivating ipv6 completely on wan2 brings back Between tests I did multiple reboots, no effect either. |
… should also permit those as default gateway. could be #3604
|
@mr44er did you push 2001:xxx:8888 and 2001:xxx:8844 through the correct gateway, this looks like a static routing issue (only one can be reachable at the same time, both can compete) |
|
you should have a static route, using the correct gateway for both monitor ip's, otherwise both will use default, which very likely is your issue. if both are dns entries, you can set a gateway there, this should be visible in your static routes. |
|
just add static routes and you're probably fine. |
|
Mhm? I think the routing table looks correct as it is with correct routes as it should. More routes would double the entry and bring chaos into routing, or am I wrong here? Could you give me an example how you mean the two static routes should look, maybe I can understand better what you mean? |
|
There should be static routes for the addresses your trying to monitor (unless these are within their own subnet range, your screenshots seem to have different monitors set). ipv4 shouldn't be different than ipv6 in that regard. |
|
if already there, you should be good. you probably have to do more debugging why you can't reach the endpoint. My community support time is limited |
I understand that for sure, but I must admit I see it as a bug and not a wrong configuration.
If I only knew, where to look. |
|
I'm not closing it (it's a support ticket), feel free to discuss, if there is an issue that one can point to I'll gladly take a look. There are some debugging tips in https://docs.opnsense.org/manual/gateways.html, maybe that helps. |
Please let me know when this is ready. I will test it. (I have one opnsense system running the latest release version and one running the latest development version.) |
|
@bimmerdriver the patches mentioned earlier in this ticket will be included in 19.7.3 (9a772fd), which should be Monday |
@AdSchellevis My development system is already at 20.1, so will the patch be in the release version? |
|
“20.1” is not a version number so will have to be more specific.
… On 3. Aug 2019, at 19:06, bimmerdriver ***@***.***> wrote:
@bimmerdriver the patches mentioned earlier in this ticket will be included in 19.7.3 (9a772fd), which should be Monday
My development system is already at 20.1, so will the patch be in the release version?
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or mute the thread.
|
The development version is running OPNsense 20.1.a_44-amd64, as of the most recent update. I updated it by setting the release type to development and then checking for updates. (Not using the command line.) Does that help? |
|
Yes, the changes you are looking for are included with 20.1.a_72, which will be included in Monday's 19.7.2 release on the development track translating to roughly 20.1.a_75 or higher if further changes are pushed to the master branch. |
|
I updated my test system yesterday. It's running 20.1.a_75. I can confirm that the problem is fixed. |
|
For my system, these patches already helped a lot; once I set the default route manually on the WAN_DHCP6 gateway, it will now stick because I can make it default now. Also, monitoring is possible again. |
|
@RehaagJ no, the change you mention will make the system more robust than it ever was. I do believe 19.7.2 will be back to where it was before. Just for perspective. ;) |
|
Well, currently, 19.7.1 with the patches isn't where it was before for me. I didn't have to define a default route manually earlier, now I need to do that. But I can't exclude the possibility that something went wrong during my many tests and/or patching, so I'll try again on 19.7.2. I'll update this topic then. |
|
With regards to the gateway monitor, is there a reason that the dashboard displays ~ as the address instead of the actual WAN gateway address (which in this case is link-local)? The interface status on the dashboard doesn't have a problem displaying the link-local WAN interface address. |
|
Sorry for the delay, I promised to update the situation after update to 19.7.2. No difference - the gateway still does not get populated (fits to what @bimmerdriver said) , and a manual route entry is needed here. This was different in 19.1. |
|
@RehaagJ ok, thanks for your feedback. |


























[X] I have read the contributing guide lines at https://github.com/opnsense/core/blob/master/CONTRIBUTING.md
[X] I have searched the existing issues and I'm convinced that mine is new.
WAN Gateway IPv6 issues started with 19.7. While this is similar to #3601 , I don't think it's the same (but maybe related; one big difference is that both my IPv6 gateways have valid IPv6 addresses, not just link local).
Setup: OPNsense 19.7.1 with WAN, LAN, DMZ and some more internal networks. WAN gets both IPv4 and IPv6 via DHCP, IPv6 sending prefix hint (size 56), directly send SOLICIT checked, prevent release checked.
Then there is an OpenVPN client that builds a tunnel to a service that provides fixed IPv4 and IPv6 addresses that I use for the DMZ (policy based routing); all other internal networks follow WAN.
That worked up until (including) 19.1.10. With 19.7, I lost routing through the WAN_DHCP6 interface as soon as the VPN tunnel came up. In the seconds between establishing WAN connection and bringing up the tunnel, WAN_DHCP6 was good. A new PTYOPENVPN_VPNV6 interface was added automatically, and declared default (duplicating my existing openvpn ipv6 gateway, which I then removed). Once that happened, the WAN_DHCP6 interface was not only no longer default, but also not useable in policy based routing any longer.
As a workaround, I introduced a route-up script for OpenVPN that removes the new wrong default ipv6 route and adds the WAN interface back as default route. With that, I had the old functionality back (even though the PTYOPENVPN_VPNV6 still gets displayed as active gateway). Dpinger correctly showed WAN_DHCP6 as online and measured times and loss.
With 19.7.1, WAN_DHCP6 vanished from the list of gateways, but the workaround still works. Dpinger now fails for WAN_DHCP6 because it cannot see the gateway.
While this workaround makes it possible to stay on 19.7.x, it is lacking features (like gateway monitoring), and is not robust (there can be situations where the default ipv6 route goes back to the OpenVPN tunnel).
Expected behavior
Multiple IPv6 interfaces should coexist, not compete with each other. It should be possible to define the one that should be default freely. I understand that the change in gateway handling removed the default selection on purpose, but the options for priority and/or upstream gateway should be able to make the preferred gateway the active one.
Environment
OPNsense 19.7.1 (amd64, OpenSSL).
The text was updated successfully, but these errors were encountered: