Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    22.05 - DCO and OpenVPN issue

    Scheduled Pinned Locked Moved OpenVPN
    50 Posts 7 Posters 8.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      swixo @jimp
      last edited by swixo

      @jimp I must have a setting aggravating it - user tman seems to have same issue.
      Just in case - here are my settings:

      DCO=on
      Mode: TUN
      Proto: UDP/v4
      interface: Any 
      Use Tls Key: Checked
      TLS Usage: Enc and Auth
      TLS KeyDir: Both
      No Cert Rev List
      No OCSP Check
      DH: 4096
      ECDH: secp384r1
      Algorithms: AES-256-GCM
      Fallback: AES-256-GCM
      Auth Digest: SHA256 (256)
      HW Crypto: Intel RDRAND
      Cert Depth (Client+Server)
      Client Certificate Key Usage: Enforce Checked
      Tunnel Network /24
      no IPV6
      Redirect: Force all IPv4 Thru tunnel: Checked
      No Redirect IPv6 checked
      Concurrent connections: blank
      Compression: Refuse non stub
      Inter Client Comm: Checked
      Duplicate Conn: Checked
      Dup Conn Limit: Blank
      Client Dynamic IP: Checked
      Topology: One IP address per client common subnet
      Ping: Inactive: 0
      Method: Keepalive
      interval: 10
      Timeout: 60
      DNS Default Domain: Checked
      DNS Server Enable: Checked
      Block Outside DNS: Unchecked
      Force DNS Update: Unchecked
      NTP Server: Checked
      Custom Options: push "route 1.2.3.4 255.255.255.0"
      UDP Fast I/O: Unchecked
      Exit Notify: Disabled
      Send/Receive Buffer: Default
      Gateway Creation ipv4 only
      1 Reply Last reply Reply Quote 0
      • jimpJ
        jimp Rebel Alliance Developer Netgate
        last edited by

        I'm using RA SSL/TLS but that shouldn't matter.

        TLS Usage: Enc and Auth

        Mine: Auth only

        TLS KeyDir: Both

        Mine: Default

        DH: 4096

        Mine: 2048

        ECDH: secp384r1

        Mine: Default

        HW Crypto: Intel RDRAND

        Set that to "No", you aren't going to gain anything from that one, especailly with DCO.

        Redirect: Force all IPv4 Thru tunnel: Checked

        I don't have this set but it's probably not going to change anything.

        Inter Client Comm: Checked

        Mine: Unchecked

        Duplicate Conn: Checked

        Mine: Unchecked (each client has a unique cert)

        Client Dynamic IP: Checked

        Mine: Unchecked

        DNS Default Domain: Checked

        Mine: Unchecked

        DNS Server Enable: Checked

        Mine: Unchecked

        NTP Server: Checked

        Mine: Unchecked

        Custom Options: push "route 1.2.3.4 255.255.255.0"

        Mine: Blank (but that one route alone should be fine)

        A lot of those, like the pushed DNS options, shouldn't make a difference. I'd focus on trying to change one thing at a time to see if it helps and if it doesn't, change it back and try the next one. That way you can isolate the potential problem there.

        I'd try changing TLS auth first to auth only, I'm not sure if anyone has tried TLS enc+auth with DCO yet.

        Also you listed several options that should be hidden when you have DCO on (like inactive and UDP fast i/o), are those really showing in your GUI with DCO checked or did you transcribe those from somewhere else?

        Remember: Upvote with the ๐Ÿ‘ button for any user/post you find to be helpful, informative, or deserving of recognition!

        Need help fast? Netgate Global Support!

        Do not Chat/PM for help!

        S JeGrJ 2 Replies Last reply Reply Quote 0
        • S
          swixo @jimp
          last edited by

          @jimp said in 22.05 - DCO and OpenVPN issue:

          HW Crypto: Intel RDRAND

          Set that to "No", you aren't going to gain anything from that one, especailly with DCO.

          I'd try changing TLS auth first to auth only, I'm not sure if anyone has tried TLS enc+auth with DCO yet.

          Also you listed several options that should be hidden when you have DCO on (like inactive and UDP fast i/o), are those really showing in your GUI with DCO checked or did you transcribe those from somewhere else?

          My bad on that - I had flipped DCO off just to get the VPN going again and hadn't thought the UX would change the options.

          I will test the changes you suggest and report.

          S 1 Reply Last reply Reply Quote 0
          • S
            swixo @swixo
            last edited by

            @swixo Tried a bunch of these changes and made things worse.

            Intel Hardware accel had no effect. But the Key Dir and Auth Only/Auth+Encry setting made a lot of difference. Had to export new profiles after every change to make sure clients were in sync.

            Most of the time - I couldn't connect at all - or data never flowed, until turning DCO off - then it usually worked fine after that.

            1 Reply Last reply Reply Quote 0
            • JeGrJ
              JeGr LAYER 8 Moderator @jimp
              last edited by

              @jimp Just to chime in:

              we were rolling out 2 new boxes 6100/4100 to a customer and I set up OpenVPN RAS pretty default with new DCO setting.

              Exactly same problem: .2 client can connect and route/transfer data, all other client IPs don't get ANY data at all sent through the connection. Switching off DCO immediatly works again. No spiffy or special stuff configured, just plain dead simple RAS setup with a single LAN network that gets pushed to the clients.

              Clients are 2x windows boxes with win10, newest OVPN Client 2.5.9/x64 and have no problems whatsoever. Routes are just fine, traffic simply refuses to flow through the server if you're not client #.2 :)

              System is on 22.05 stable

              Cheers
              \jens

              Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

              1 Reply Last reply Reply Quote 1
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Hmm, were those supplied with 22.05 or upgraded from 22.01?

                Does that include traffic between IPs in the tunnel subnet directly?

                JeGrJ 1 Reply Last reply Reply Quote 0
                • JeGrJ
                  JeGr LAYER 8 Moderator @stephenw10
                  last edited by

                  @stephenw10 Those were freshly installed with 22.01 and clean upgraded to 22.05 - at least there were no errors or other hiccups in the logs or anywhere to see.

                  Besides that it's a simple straightforward RAS style setup:

                  • SSL/TLS + User Auth
                  • DCO
                  • tun L3
                  • UDP/1194
                  • TLS Key with TLS Auth (not auth+enc), default direction
                  • VPN CA, VPN Cert, VPN CRL created
                  • ECDH only
                  • prime256v1
                  • SHA256
                  • no HW crypt (but AES-NI enabled kernel module)
                  • cert depth 1 (C+S)
                  • Strict User-CN Matching
                  • Enforce Key usage
                  • IP4 tunnel network 192.168.45.0/26 (to leave space to add another VPNs server later with .45.64/26, .45.128/26, etc.)
                  • IP4 local network 192.168.40.0/24 (LAN)
                  • compression: refuse any non stub (most secure)
                  • dynamic IP selected
                  • subnet
                  • keepalive 5 30
                  • DNS default domain set up to the locally used domain
                  • DNS server set up to the local MS AD server
                  • Gateway v4 only
                  • Verb 3

                  nothing else set. The RAS clients aren't supposed to talk with each other so no, inter-client comm isn't a thing here :)

                  Cheers
                  \jens

                  Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    I mean can clients other than .2 ping the server tunnel IP?

                    1 Reply Last reply Reply Quote 0
                    • jimpJ jimp moved this topic from Plus 22.05 Development Snapshots (Retired) on
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      I've been unable to replicate this so far. Did you test disabling AES-NI?

                      JeGrJ 1 Reply Last reply Reply Quote 0
                      • JeGrJ
                        JeGr LAYER 8 Moderator @stephenw10
                        last edited by

                        @stephenw10 said in 22.05 - DCO and OpenVPN issue:

                        I mean can clients other than .2 ping the server tunnel IP?

                        Ah that's what you meant! I just switched DCO back on and tested for you:

                        • VPN net: 192.168.45.0/24
                        • LAN net: 192.168.40.0/24

                        When DCO is on:

                        • Client 1 connected as .45.2:

                          • ping to .45.1 (VPN GW) -> works
                          • ping to 40.1 (FW IP in LAN) -> works
                          • ping to 40.x (any other IP then Firewall) -> works
                          • can connect to e.g. Server on 192.168.40.10
                        • Client 2 connected as .45.3:

                          • ping to .45.1 (VPN GW) -> works
                          • ping to 40.1 (FW IP in LAN) -> works
                          • ping to 40.x (any other IP then Firewall) -> DOESN'T work
                          • no connect to any other device on the LAN is working

                        As there are IPsec tunnels currently in use I couldn't disable crypto but it is set to QAT - not AES-NI - as it's a 6100 :)

                        Cheers

                        Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

                        If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Ah, OK I was testing to the LAN IP. Retesting....

                          1 Reply Last reply Reply Quote 1
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Ok, replicated it. Let me see if I can narrow it down....

                            S 1 Reply Last reply Reply Quote 2
                            • S
                              swixo @stephenw10
                              last edited by

                              @stephenw10 Whew! Glad this was tracked down.

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                OK, this looks like an internal routing issue. As a workaround applying outbound NAT to traffic leaving the LAN appears to allow it to route replies as expected. If you want to test DCO that is.

                                Steve

                                JeGrJ 1 Reply Last reply Reply Quote 1
                                • JeGrJ
                                  JeGr LAYER 8 Moderator @stephenw10
                                  last edited by

                                  @stephenw10 Would that be subject to a patch via "System Patches" or is the routing issue deeper than the patch system can go and requires a new build/version of some files? Just asking if that'd be hotfix'able.

                                  Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

                                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    It's probably not something that can be fixed with a run-time patch unfortunately. It looks to be in OpenVPN so something in the binary.

                                    Steve

                                    JeGrJ 1 Reply Last reply Reply Quote 1
                                    • JeGrJ
                                      JeGr LAYER 8 Moderator @stephenw10
                                      last edited by

                                      @stephenw10 said in 22.05 - DCO and OpenVPN issue:

                                      It's probably not something that can be fixed with a run-time patch unfortunately. It looks to be in OpenVPN so something in the binary.

                                      Steve

                                      Thanks for clarifying - thus we know to currently not roll it out enabled per default :)

                                      Don't forget to upvote ๐Ÿ‘ those who kindly offered their time and brainpower to help you!

                                      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.