Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Packet loss when download and TCP connection error

    Scheduled Pinned Locked Moved OpenVPN
    13 Posts 3 Posters 577 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      mavenhalo
      last edited by

      Hi,

      It's my first post in this forum.
      I have big problems with OpenVPN and NordVPN when any of my devices downloads on my network, the rate of packet loss increase and the gateway monitoring becomes down.
      When the download stops, all is immediately good.

      My pfSense version is 2.6.0 and my OpenVPN Client protocol is UDP.
      The MTU is 1500.

      So I tried to connect with TCP.
      The connection is OK, but there is always 100% of packet loss even without download.
      The OpenVPN logs in TCP mode :

      Aug 25 08:30:27	openvpn	39248	event_wait returned 1
      Aug 25 08:30:27	openvpn	39248	PO_WAIT[1,0] fd=6 rev=0x00000001 rwflags=0x0001 arg=0x002b6724
      Aug 25 08:30:27	openvpn	39248	I/O WAIT TR|Tw|SR|Sw [11/69244]
      Aug 25 08:30:27	openvpn	39248	PO_CTL rwflags=0x0001 ev=4 arg=0x002b6728
      Aug 25 08:30:27	openvpn	39248	PO_CTL rwflags=0x0001 ev=6 arg=0x002b6724
      Aug 25 08:30:27	openvpn	39248	PO_CTL rwflags=0x0001 ev=5 arg=0x002b7428
      Aug 25 08:30:27	openvpn	39248	STREAM: SET NEXT, buf=[572,0] next=[572,1659] len=-1 maxlen=1659
      Aug 25 08:30:27	openvpn	39248	write TCPv4_CLIENT: Permission denied (code=13)
      Aug 25 08:30:27	openvpn	39248	TCPv4_CLIENT write returned -1
      Aug 25 08:30:27	openvpn	39248	STREAM: WRITE 54 offset=500
      Aug 25 08:30:27	openvpn	39248	TCPv4_CLIENT WRITE [54] to [AF_INET]138.199.47.175:443: P_DATA_V2 kid=0 DATA 00000000 00009fb9 d7446586 331eead2 5e1b19fb 59012530 499c0428 127c379[more...]
      Aug 25 08:30:27	openvpn	39248	I/O WAIT status=0x0002
      

      There is no blocked traffic on the snort, pfBlocker and firewall logs.
      I didn't found solution on the net, so this is the last place where I could find help.

      GertjanG 1 Reply Last reply Reply Quote 0
      • GertjanG
        Gertjan @mavenhalo
        last edited by Gertjan

        @mavenhalo

        Can you show all the OpenVPN client log lines ?
        From complete stop to running ?

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        M 1 Reply Last reply Reply Quote 0
        • M
          mavenhalo @Gertjan
          last edited by

          @gertjan

          Here is the log when the server stops (UDP mode) and starts (TCP mode) :

          Aug 25 09:43:31	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
          Aug 25 09:43:30	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
          Aug 25 09:43:30	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
          Aug 25 09:43:29	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
          Aug 25 09:43:29	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
          Aug 25 09:43:28	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
          Aug 25 09:42:54	openvpn	68471	Initialization Sequence Completed
          Aug 25 09:42:54	openvpn	68471	WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
          Aug 25 09:42:54	openvpn	68471	/usr/local/sbin/ovpn-linkup ovpnc5 1500 1586 10.7.2.2 255.255.255.0 init
          Aug 25 09:42:54	openvpn	68471	/sbin/route add -net 10.7.2.0 10.7.2.1 255.255.255.0
          Aug 25 09:42:54	openvpn	68471	/sbin/ifconfig ovpnc5 10.7.2.2 10.7.2.1 mtu 1500 netmask 255.255.255.0 up
          Aug 25 09:42:54	openvpn	68471	TUN/TAP device /dev/tun5 opened
          Aug 25 09:42:54	openvpn	68471	TUN/TAP device ovpnc5 exists previously, keep at program end
          Aug 25 09:42:54	openvpn	68471	ROUTE_GATEWAY 91.XX.XX.XX/255.255.255.0 IFACE=igb0 HWADDR=40:62:31:11:0e:48
          Aug 25 09:42:54	openvpn	68471	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
          Aug 25 09:42:54	openvpn	68471	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
          Aug 25 09:42:54	openvpn	68471	Data Channel: using negotiated cipher 'AES-256-GCM'
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: data channel crypto options modified
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: adjusting link_mtu to 1658
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: peer-id set
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: route-related options modified
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: route options modified
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --ifconfig/up options modified
          Aug 25 09:42:54	openvpn	68471	Socket Buffers: R=[65700->524288] S=[65700->524288]
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: compression parms modified
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
          Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: timers and/or timeouts modified
          Aug 25 09:42:54	openvpn	68471	PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.2.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
          Aug 25 09:42:54	openvpn	68471	SENT CONTROL [fr780.nordvpn.com]: 'PUSH_REQUEST' (status=1)
          Aug 25 09:42:53	openvpn	68471	[fr780.nordvpn.com] Peer Connection Initiated with [AF_INET]138.199.47.175:443
          Aug 25 09:42:53	openvpn	68471	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
          Aug 25 09:42:53	openvpn	68471	WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
          Aug 25 09:42:53	openvpn	68471	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1636'
          Aug 25 09:42:53	openvpn	68471	VERIFY OK: depth=0, CN=fr780.nordvpn.com
          Aug 25 09:42:53	openvpn	68471	VERIFY EKU OK
          Aug 25 09:42:53	openvpn	68471	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
          Aug 25 09:42:53	openvpn	68471	Validating certificate extended key usage
          Aug 25 09:42:53	openvpn	68471	VERIFY KU OK
          Aug 25 09:42:53	openvpn	68471	VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
          Aug 25 09:42:53	openvpn	68471	VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
          Aug 25 09:42:53	openvpn	68471	VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
          Aug 25 09:42:53	openvpn	68471	VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7
          Aug 25 09:42:53	openvpn	68471	VERIFY WARNING: depth=0, unable to get certificate CRL: CN=fr780.nordvpn.com
          Aug 25 09:42:53	openvpn	68471	TLS: Initial packet from [AF_INET]138.199.47.175:443, sid=43d86a7c 77d9f5a4
          Aug 25 09:42:53	openvpn	68471	TCPv4_CLIENT link remote: [AF_INET]138.199.47.175:443
          Aug 25 09:42:53	openvpn	68471	TCPv4_CLIENT link local (bound): [AF_INET]91.XX.XX.XX:0
          Aug 25 09:42:53	openvpn	68471	TCP connection established with [AF_INET]138.199.47.175:443
          Aug 25 09:42:53	openvpn	68471	Attempting to establish TCP connection with [AF_INET]138.199.47.175:443 [nonblock]
          Aug 25 09:42:53	openvpn	68471	Socket Buffers: R=[65228->65228] S=[65228->65228]
          Aug 25 09:42:53	openvpn	68471	TCP/UDP: Preserving recently used remote address: [AF_INET]138.199.47.175:443
          Aug 25 09:42:53	openvpn	68471	Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
          Aug 25 09:42:53	openvpn	68471	Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
          Aug 25 09:42:53	openvpn	68471	WARNING: experimental option --capath /var/etc/openvpn/client5/ca
          Aug 25 09:42:53	openvpn	68471	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
          Aug 25 09:42:53	openvpn	68471	MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client5/sock
          Aug 25 09:42:53	openvpn	68215	library versions: OpenSSL 1.1.1l-freebsd 24 Aug 2021, LZO 2.10
          Aug 25 09:42:53	openvpn	68215	OpenVPN 2.5.4 amd64-portbld-freebsd12.3 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 12 2022
          Aug 25 09:42:53	openvpn	68215	WARNING: file '/var/etc/openvpn/client5/up' is group or others accessible
          Aug 25 09:42:53	openvpn	17811	SIGTERM[soft,exit-with-notification] received, process exiting
          Aug 25 09:42:53	openvpn	17811	/usr/local/sbin/ovpn-linkdown ovpnc5 1500 1584 10.8.1.4 255.255.255.0 init
          Aug 25 09:42:53	openvpn	17811	Closing TUN/TAP interface
          Aug 25 09:42:52	openvpn	17811	SIGTERM received, sending exit notification to peer
          Aug 25 09:42:52	openvpn	17811	event_wait : Interrupted system call (code=4)
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client disconnected
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'status 2'
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'state 1'
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client connected from /var/etc/openvpn/client5/sock
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client disconnected
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'status 2'
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'state 1'
          Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client connected from /var/etc/openvpn/client5/sock
          

          And the same log when the server stops (TCP mode) and starts (UDP mode) :

          Aug 25 09:49:41	openvpn	525	Initialization Sequence Completed
          Aug 25 09:49:41	openvpn	525	WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
          Aug 25 09:49:41	openvpn	525	/usr/local/sbin/ovpn-linkup ovpnc5 1500 1584 10.8.0.2 255.255.255.0 init
          Aug 25 09:49:41	openvpn	525	/sbin/route add -net 10.8.0.0 10.8.0.1 255.255.255.0
          Aug 25 09:49:41	openvpn	525	/sbin/ifconfig ovpnc5 10.8.0.2 10.8.0.1 mtu 1500 netmask 255.255.255.0 up
          Aug 25 09:49:41	openvpn	525	TUN/TAP device /dev/tun5 opened
          Aug 25 09:49:41	openvpn	525	TUN/TAP device ovpnc5 exists previously, keep at program end
          Aug 25 09:49:41	openvpn	525	ROUTE_GATEWAY 91.XX.XX.XX/255.255.255.0 IFACE=igb0 HWADDR=40:62:31:11:0e:48
          Aug 25 09:49:41	openvpn	525	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
          Aug 25 09:49:41	openvpn	525	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
          Aug 25 09:49:41	openvpn	525	Data Channel: using negotiated cipher 'AES-256-GCM'
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: data channel crypto options modified
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: adjusting link_mtu to 1656
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: peer-id set
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: route-related options modified
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: route options modified
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: --ifconfig/up options modified
          Aug 25 09:49:41	openvpn	525	Socket Buffers: R=[42080->524288] S=[57344->524288]
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: compression parms modified
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: explicit notify parm(s) modified
          Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: timers and/or timeouts modified
          Aug 25 09:49:41	openvpn	525	PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
          Aug 25 09:49:41	openvpn	525	SENT CONTROL [fr780.nordvpn.com]: 'PUSH_REQUEST' (status=1)
          Aug 25 09:49:40	openvpn	525	[fr780.nordvpn.com] Peer Connection Initiated with [AF_INET]138.199.47.175:1194
          Aug 25 09:49:40	openvpn	525	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
          Aug 25 09:49:40	openvpn	525	WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
          Aug 25 09:49:40	openvpn	525	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
          Aug 25 09:49:40	openvpn	525	VERIFY OK: depth=0, CN=fr780.nordvpn.com
          Aug 25 09:49:40	openvpn	525	VERIFY EKU OK
          Aug 25 09:49:40	openvpn	525	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
          Aug 25 09:49:40	openvpn	525	Validating certificate extended key usage
          Aug 25 09:49:40	openvpn	525	VERIFY KU OK
          Aug 25 09:49:40	openvpn	525	VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
          Aug 25 09:49:40	openvpn	525	VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
          Aug 25 09:49:40	openvpn	525	VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
          Aug 25 09:49:40	openvpn	525	VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7
          Aug 25 09:49:40	openvpn	525	VERIFY WARNING: depth=0, unable to get certificate CRL: CN=fr780.nordvpn.com
          Aug 25 09:49:40	openvpn	525	TLS: Initial packet from [AF_INET]138.199.47.175:1194, sid=f09271c1 8086d3bd
          Aug 25 09:49:40	openvpn	525	UDPv4 link remote: [AF_INET]138.199.47.175:1194
          Aug 25 09:49:40	openvpn	525	UDPv4 link local (bound): [AF_INET]91.XX.XX.XX:0
          Aug 25 09:49:40	openvpn	525	Socket Buffers: R=[42080->42080] S=[57344->57344]
          Aug 25 09:49:40	openvpn	525	TCP/UDP: Preserving recently used remote address: [AF_INET]138.199.47.175:1194
          Aug 25 09:49:40	openvpn	525	Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
          Aug 25 09:49:40	openvpn	525	Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
          Aug 25 09:49:40	openvpn	525	WARNING: experimental option --capath /var/etc/openvpn/client5/ca
          Aug 25 09:49:40	openvpn	525	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
          Aug 25 09:49:40	openvpn	525	MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client5/sock
          Aug 25 09:49:40	openvpn	263	library versions: OpenSSL 1.1.1l-freebsd 24 Aug 2021, LZO 2.10
          Aug 25 09:49:40	openvpn	263	OpenVPN 2.5.4 amd64-portbld-freebsd12.3 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 12 2022
          Aug 25 09:49:40	openvpn	263	WARNING: file '/var/etc/openvpn/client5/up' is group or others accessible
          Aug 25 09:49:39	openvpn	68471	SIGTERM[hard,] received, process exiting
          Aug 25 09:49:39	openvpn	68471	/usr/local/sbin/ovpn-linkdown ovpnc5 1500 1587 10.7.3.5 255.255.255.0 init
          Aug 25 09:49:39	openvpn	68471	Closing TUN/TAP interface
          Aug 25 09:49:39	openvpn	68471	event_wait : Interrupted system call (code=4)
          Aug 25 09:49:39	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
          
          GertjanG 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @mavenhalo
            last edited by

            @mavenhalo

            Why alternate between UDP and TCP ?
            Why not : make one works.
            Then, when done, make the other work (create a new instance)

            Your logs look fine.
            But mtu values bigger then 1500 .... are you sure ?

            Packets leaving your native WAN interface are probably a bit lower as 1500. So, encapsulated packets like the ones send to a VPN server must be smaller.

            General advise : you NordVPN is probably not using OpenVPN 2.5.4, but another version. It could even be the older 2.4.x series.
            This means you have to visit the official OpenVPN documentation, and see what you have to chose : "comp-lzo" did change in the newer 2.5.x series.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            M 1 Reply Last reply Reply Quote 0
            • M
              mavenhalo @Gertjan
              last edited by

              @gertjan

              I have packets loss with UDP and can't find the solution so I try also in TCP until one of them works.

              I didn't set a MTU value bigger than 1500. I set 1500 on the OpenVPN client like the value which is in the document of NordVPN for pfSense 2.4.5.
              I set also 1500 directly on the OpenVPN interface.
              So I don't understand why there is a MTU of 1656 in the log ?

              My custom options are :

              tls-client;
              remote-random;
              tun-mtu 1500;
              tun-mtu-extra 32;
              mssfix 1450;
              persist-key;
              persist-tun;
              reneg-sec 0;
              remote-cert-tls server;
              
              GertjanG 1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @mavenhalo
                last edited by Gertjan

                @mavenhalo said in Packet loss when download and TCP connection error:

                tls-client;

                When using a VPN 'thing', always double check the settings.
                Have a look here /var/etc/openvpn/clientx/ where x can be 1,2, etc.
                You find several files, and among them the famous config.opvn

                Open the file, and check the content.
                You will probably find a first "tls-client", as you are setting up a OpenVPN client so the next tls-client line (is part of your custom config) isn't needed.
                While you see the file, check other options for doubles and other awkward stuff.

                Remember : this is OpenVPN. Using a GUI is nice, but it always boils down to 'a config file'.

                Btw : I'm not using Nord, but Express.
                My custom settinsg are :

                remote-random;
                pull;
                comp-lzo;
                verify-x509-name Server name-prefix;
                remote-cert-tls server;
                key-direction 1;
                route-method exe;
                route-delay 2;
                tun-mtu 1500;
                fragment 1300;
                mssfix 1450;
                

                Double check the usage of :
                tun-mtu-extra 32; <= never saw this one before
                persist-key; <= probably also already included - so remove them from your custom config
                persist-tun; <= idem
                reneg-sec 0;

                If the Nord instruction are for a pfSense 2.4.5, then keep in mind that these are valid for an (very) old OpenVPN version, as said, an earlier 2.4.x.
                Try finding instructions for a more recent pfSense version (using OpenVPN 2.5.4).

                I'm a bit perplex about your mtu values. They seem 'not logic' to me.

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                M 1 Reply Last reply Reply Quote 0
                • Cool_CoronaC
                  Cool_Corona
                  last edited by

                  How big is your bandwith and is the download using all of the bandwith??

                  1 Reply Last reply Reply Quote 0
                  • M
                    mavenhalo
                    last edited by

                    I will check my config file.

                    My bandwith is about 400Mb/s down and 300Mb/s up.
                    Through the VPN, I notice a bandwith of 200Mb/s down and 120Mb/s up.

                    1 Reply Last reply Reply Quote 0
                    • M
                      mavenhalo @Gertjan
                      last edited by

                      @gertjan

                      I have check the config file.
                      I found only these duplicate lines that I have removed from my custom options :

                      tls-client;
                      persist-key;
                      persist-tun;
                      

                      I tried to remove tun-mtu-extra, same behavior.

                      Can the problem comes from something else than the OpenVPN configuration ?

                      GertjanG 1 Reply Last reply Reply Quote 0
                      • GertjanG
                        Gertjan @mavenhalo
                        last edited by Gertjan

                        @mavenhalo said in Packet loss when download and TCP connection error:

                        Can the problem comes from something else than the OpenVPN configuration ?

                        The problem is : a conflicting configuration between VPN server (Nord) and the client - pfSense.
                        As said, I'm not using Nord myself, but I have a working Express ( not sure - read on ) OpenVPN client setup.

                        When I start mine, I can't really use it, as I did not complete the routing part.
                        But, I can use the active OpenVPN client interface to ping with it :

                        70173cd6-5bba-4f05-b58d-fb62cfa2a3d8-image.png

                        The 330 ms delay is due to the fact that I'm using a VPN server from "usa-sanfrancisco-ca-version-2.expressnetw.com" which is not really in my neighbourhood ;)

                        edit :

                        nordvpn with pfSense

                        Forget about the links that mention 2.4.5 (ancient, dangerous ....) or even 2.5.0 (also old) or even 2.5.2.

                        Look for specific pfSense 2.6.0, use no other ones.

                        [Rambling : start]

                        If their is no info, then it might be the case that the OpenVPN version that Nord uses isn't the stock OpenVPN ( from here ) as that is the place where pfSEnse got it from.
                        Nord can have their own 'adapted' build as they only need to make it work with their own 'App', the one you install on your PC or Mac or Phone.
                        I didn't checked their support sites, but, if you can make it work with your 'router', then great for you. If not, they don't care, as that isn't their goal.
                        Their goals is are : Make money. Spend less on support. Tell support that they should tell the customers : install the App. For the rest, you are on your own aka non supported.

                        By now you start to understand that you can't chose a VPN by watching a Youtube video, and that there is more then 'price'.
                        (Your) questions like : "you support my router ," should be number one.

                        [Rambling : stop]

                        Still, I think OpenVPN is possible.

                        Btw : Nord supports Wiregaurd ? Never used that one myself, but give it a go, as it is waaaaaay simpler to set up.

                        Also : you have seen [https://techshielder.com/how-to-setup-and-use-nordvpn-on-pfsense](link url) I presume.

                        but you already saw that half of this :

                        0e2c8499-05b5-40f4-9294-c370316a623b-image.png

                        is a bit BS.

                        So, I tend to ask myself : what about the rest ? ;)

                        Btw : https://techshielder.com/how-to-setup-and-use-nordvpn-on-pfsense looks nice, but there are NO intermediate tests, like : when done this, test this, and it should work.
                        So you can't know what went wrong where.
                        And because you and I don't know shit about VPN anyway (I'm pretty for myself), we could also typing pure Chinese characters from a web page, we're lost.

                        Here is one for free :
                        When you reach step 12, do the ping test first as I've shown above.
                        You will know if the tunnel is up (not usable for traffic, but up) - see my example.

                        Also : who is 103.86.96.100 ? is it safe ?

                        Isn't the default resolving not just fine ? Just route all resolver traffic over the VPN connection, and done.
                        IMHO : Don't mess with DNS, the out of the box DNS works fine, things go often downhill when people start to enter their own DNS choices (and then its pfSense's fault of course).

                        edit : sorry, no mega helpful here.

                        No "help me" PM's please. Use the forum, the community will thank you.
                        Edit : and where are the logs ??

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          mavenhalo @Gertjan
                          last edited by

                          There is something I don't understand.

                          When I download from my server, I see loss on the VPN gateway in pfSense.
                          But, is it packets loss from the data I download, or a saturation (bandwith, CPU, etc...) of pfSense with a consequence in the monitoring of the gateway ?

                          How can I know if my transfer of data had lost packets ?

                          ps : I have a Qotom with a core i5-4210U and 8GB

                          GertjanG 1 Reply Last reply Reply Quote 0
                          • GertjanG
                            Gertjan @mavenhalo
                            last edited by

                            @mavenhalo said in Packet loss when download and TCP connection error:

                            How can I know if my transfer of data had lost packets ?

                            When you use your VPN, start a ping like this :

                            ping www.google.com -t
                            

                            Now, do a download test with a navigator, or start downloading something big, from a source that as 'infinite' output. Try to install the WorldofTanks game from wargaming.
                            You will most probably see packet and thus ping packet loss.

                            One thing that you can't really test : the output of your VPN server, your VPN ISP, they all say they give you 'a lot'. But they actually share the outgoing bandwidth among all connected clients. And ones the pipe is full, everything gets throttled.
                            Also : the VPN is most probably UDP, and that traffic can get discared : packets (and pings) get lost. Traffic will retransmitted and re assembled to the correct info of course.

                            No "help me" PM's please. Use the forum, the community will thank you.
                            Edit : and where are the logs ??

                            1 Reply Last reply Reply Quote 0
                            • Cool_CoronaC
                              Cool_Corona
                              last edited by

                              When you fill your pipe on the VPN with a DL then packetloss will occur.

                              Everything else is getting throttled.

                              Also a normal DL on the connection that fills the pipe will see packetloss.

                              Thats why people tend to use bandwidth limiters for the services so this doesnt occur.

                              1 Reply Last reply Reply Quote 1
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.