Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Observations, 25.03.b.20250414.1838

    Scheduled Pinned Locked Moved Plus 25.07 Develoment Snapshots
    13 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      netblues @netblues
      last edited by

      @netblues
      this is with heavy limiting, for the shake of testing

      2e57cd67-128a-4a6f-a17c-b0806ea5a40a-image.png

      1 Reply Last reply Reply Quote 0
      • M
        marcosm Netgate
        last edited by

        Please share the core dump files here:
        https://nc.netgate.com/nextcloud/s/zJfaxPfrfAAniwF

        P 1 Reply Last reply Reply Quote 0
        • P
          pst @marcosm
          last edited by

          @marcosm done.

          1 Reply Last reply Reply Quote 0
          • P
            pst @pst
            last edited by

            @pst said in Observations, 25.03.b.20250414.1838:

            This non-optimal handling of wireguard tunnels during boot has previously been reported on 24.05, and a bug raised.

            The bug in question is https://redmine.pfsense.org/issues/15435

            While the root cause is still to be determined, a possible cause could be that some of my WG peers are configured with ends point addresses using FQDNs, and resolving those during boot are causing the slow boot (TBC).

            P 1 Reply Last reply Reply Quote 0
            • P
              pst @pst
              last edited by

              @pst said in Observations, 25.03.b.20250414.1838:

              a possible cause could be that some of my WG peers are configured with ends point addresses using FQDNs, and resolving those during boot are causing the slow boot

              I have just confirmed that the root cause is the use of FQDN in the peer end-point address. While a temporary work-around is to use IP addresses instead of FQDNs, FQDNs must be allowed as one of my providers specifies FQDNs for a pool of addresses.

              P 1 Reply Last reply Reply Quote 0
              • P
                pst @pst
                last edited by pst

                @pst I have found a solution that works in my scenario, where Wireguard requires Unbound to be up and running before starting the service. By disabling the early shell command to start wireguardd, and let wireguardd start at the end of the boot sequence (no change required here), my slow/failed boot is no more.

                Update: a local patch is required to stop wireguard from automatically reinstalling the early shell command. See redmine for details.

                1 Reply Last reply Reply Quote 0
                • M
                  marcosm Netgate @pst
                  last edited by

                  @pst said in Observations, 25.03.b.20250414.1838:

                  I don't think this is a real error. The VIP ::10.10.10.1/128 is set up when pfBlockerNG is configured. The ::151 will be part of the subnet that is set up when the WAN receives the IPv6 config, which is hasn't yet. LAN is tracking WAN in my IPv6 config.

                  Presumably ::10.10.10.1/128 is on Localhost and ::151 is a static mapping on LAN - correct? The error itself seems correct - the address ::151 is not in the subnet ::10.10.10.1/128. Would you share the full /usr/local/etc/kea/kea-dhcp6.conf while the issue exists? You may upload it to:
                  https://nc.netgate.com/nextcloud/s/zJfaxPfrfAAniwF

                  P 1 Reply Last reply Reply Quote 0
                  • P
                    pst @marcosm
                    last edited by

                    @marcosm yes, ::10.10.10.1/128 is on the LAN

                    4c584177-b9a2-4497-8b2d-8302488d5a2e-image.png

                    and ::151 is a static mapping on the LAN

                    4b166902-b6f8-43e9-be99-9bed2e53880a-image.png

                    I am uploading a zip that contains

                    • kea-dhcp6.conf.ATERROR which is the contents after I release the WAN lease (triggers the ERROR)
                    • kea-dhcp6.conf.AFTERSUBNETASSIGNED which is the working file after reception of the subnet config
                    • kea-dhcp6.conf.diff is the diff between the two
                    • dhcpd.log are the log entries for the renewal of the WAN lease

                    To me it looks like the error situation is present until we receive the IPv6 subnet configuration for the WAN which is then propagated to the LANs. I also saw this in 24.11 but paid less attention to it as it didn't trigger an alarm bell on the dashboard.

                    P 1 Reply Last reply Reply Quote 0
                    • P
                      pst @pst
                      last edited by

                      @marcosm I did some additional testing and managed to reduce the number of occurances of the error.

                      First I changed the WAN config, unchecked the "Do not wait for RA" (which was previously checked for some reason).

                      I then released the WAN lease, which triggered one error as seen before. When I renewed the WAN lease there were no errors, progress!

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        marcosm Netgate @pst
                        last edited by

                        @pst DM'd with request for additional info.

                        1 Reply Last reply Reply Quote 0
                        • M
                          marcosm Netgate
                          last edited by

                          Details and fix for the Kea error:
                          https://redmine.pfsense.org/issues/16154

                          1 Reply Last reply Reply Quote 3
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.