DHCP fails silently, but works on reboot of pfSense
-
I have found a workaround so far by using the DHCP relay to an external DHCP server. Still very puzzled why the local DHCP daemon crashes on pfSense.
-
I'm seeing a very similar issue. DHCP just stops working... reboot come back online. restarting DHCP service alone does not do the trick. Running XG-1541 on 2.4.4
-
There are no errors at all in the system log or DHCP log?
The service shows as stopped under Status > Services?
If you restart the service there, it doesn't work? (Or if it's running, stop and then start it again)
Anything else unusual when it's down, like RAM usage?
Are you using any other new/recent features like DNS over TLS?
-
- The system log is littered with:
Nov 6 08:10:55 check_reload_status updating dyndns optxx
Nov 6 08:10:56 kernel vlanxx: changing name to 'igb4.xxxx'
Nov 6 08:10:56 check_reload_status Restarting ipsec tunnels - Big Red X next to DHCP Services
- Hitting the little blue "play" button gets the green gear spinning but then settles back at a red X with blue play button
- Memory usage is at 2%
- No DNS over TLS (using default Resolver
I'm confused about the ipsec tunnels being constantly restarted as I have not started any VPN services. I am running 100+ VLANs.
- The system log is littered with:
-
It's sounding like there is some kind of interface event happening that triggers it. Something is causing the link to bounce on that interface. Are you sure those are the only three messages that happen? Maybe if you show more log lines you'd see the actual culprit.
Are any of the VLANs (or the parent interface) set to obtain their own IP address from DHCP, like a cable WAN? If so you might be hitting https://redmine.pfsense.org/issues/8507 if the interface has advanced DHCP client options enabled.
-
@jimp
Every VLAN interface is setup for static IP configuration
I am not sure why the "updating dyndns optxx" either unless apart of default DNS Resolver
Also, the "kernel vlanxx" are vlan numbers I have not setupNov 6 08:22:12 check_reload_status Restarting ipsec tunnels
Nov 6 08:22:25 check_reload_status updating dyndns optxx
Nov 6 08:22:25 kernel vlanxx: changing name to 'igb2.xxxx'
Nov 6 08:22:25 check_reload_status Restarting ipsec tunnels
Nov 6 08:22:37 check_reload_status updating dyndns optxx
Nov 6 08:22:37 php-fpm 27426 /interfaces.php: Gateway, none 'available' for inet6, use the first one configured. ''
Nov 6 08:22:37 kernel vlanxx: changing name to 'igb4.xxxx'
Nov 6 08:22:37 check_reload_status Restarting ipsec tunnels
Nov 6 08:22:49 check_reload_status updating dyndns optxx
Nov 6 08:22:49 kernel vlanxx: changing name to 'igb4.xxxx'
Nov 6 08:22:49 check_reload_status Restarting ipsec tunnels
Nov 6 08:23:01 check_reload_status updating dyndns optxx
Nov 6 08:23:02 kernel vlanxx: changing name to 'igb2.xxxx'
Nov 6 08:23:02 check_reload_status Restarting ipsec tunnels
Nov 6 08:23:14 check_reload_status updating dyndns optxx
Nov 6 08:23:14 check_reload_status Restarting ipsec tunnels
Nov 6 08:23:14 kernel vlanxx: changing name to 'igb2.xxxx'
Nov 6 08:23:26 check_reload_status updating dyndns optxx
Nov 6 08:23:27 check_reload_status Restarting ipsec tunnels
Nov 6 08:23:27 kernel vlanxx: changing name to 'igb2.xxxx'
Nov 6 08:23:39 check_reload_status updating dyndns optxx
Nov 6 08:23:40 kernel vlanxx: changing name to 'igb2.xxxx'
Nov 6 08:23:40 php-fpm 9855 /interfaces.php: Gateway, none 'available' for inet6, use the first one configured. ''
Nov 6 08:23:40 check_reload_status Restarting ipsec tunnels
Nov 6 08:23:52 check_reload_status updating dyndns optxx
Nov 6 08:23:52 check_reload_status Restarting ipsec tunnels
Nov 6 08:23:52 kernel vlanxx: changing name to 'igb2.xxxx' -
There must be something farther back in the logs that triggers all of that, though. Those are all the consequence of some kind of interface event (link up/down) or similar.
-
This is WAY off topic, so I apologize, and maybe it can be a separate topic.
@obelsen - I'm very new to the use and tech, but why would there be a real-world use for so many VLAN's - you state 200 in your original post. How/when would anybody need to use that many virtual networks? I could see a handful being useful, but why a very large amount? I'm just curious...
Jeff
-
@jimp said in DHCP fails silently, but works on reboot of pfSense:
There are no errors at all in the system log or DHCP log?
The service shows as stopped under Status > Services?
If you restart the service there, it doesn't work? (Or if it's running, stop and then start it again)
Anything else unusual when it's down, like RAM usage?
There are no errors in either the system log or the DHCP log.
It is not possible to restart the service, only by restarting the machine. The service is stopped, and is not running. RAM usage is far from a problem on our XG-2758.Are you using any other new/recent features like DNS over TLS?
No.
@jimp said in DHCP fails silently, but works on reboot of pfSense:
There must be something farther back in the logs that triggers all of that, though. Those are all the consequence of some kind of interface event (link up/down) or similar.
While this was a response to someone else, there is nothing on my machine's logs that indicates any problem at all. The service simply fails to start, but when it runs it doesn't have any issues unless something configures an interface, leading to the DHCP service silent crash.
@akuma1x said in DHCP fails silently, but works on reboot of pfSense:
This is WAY off topic, so I apologize, and maybe it can be a separate topic.
@obelsen - I'm very new to the use and tech, but why would there be a real-world use for so many VLAN's - you state 200 in your original post. How/when would anybody need to use that many virtual networks? I could see a handful being useful, but why a very large amount? I'm just curious...
Jeff
200 VLANs is hardly what I would expect as exceptional. We use it to ensure that all communication goes through our firewall, so we can filter traffic as we want per socket. Port isolation on our switches was another alternative, but gives less control.
-
So there are no log messages at all in your case? Not even any interface events or other logs that seem to repeat like the other person seeing this?
When you have dhcpd running, look at the output of
ps uxaww | grep dhcpd
and note the full command output. Next time it fails, try to run that by hand from an ssh or console shell and see if it produces any output. If it doesn't, try adding-d
to the parameters before anything else, which should have it print output to the terminal. -
@jimp said in DHCP fails silently, but works on reboot of pfSense:
So there are no log messages at all in your case? Not even any interface events or other logs that seem to repeat like the other person seeing this?
None. In the DHCP log, only events related to new leases are present. When I try to restart the service, it only logs the listening/sending interfaces. Following every restart of the service, it's nothing until the same log spam of listening/sending interfaces, ending with the sending on socket/fallback.
When you have dhcpd running, look at the output of
ps uxaww | grep dhcpd
and note the full command output. Next time it fails, try to run that by hand from an ssh or console shell and see if it produces any output. If it doesn't, try adding-d
to the parameters before anything else, which should have it print output to the terminal.The DHCP server fails only when modifying interfaces. It does not crash when it is already running. I would expect this is because the daemon is restarted, and it is unable to start again.
I will try to replicate the conditions again in a VM and run ps, however it did not enlighten me earlier when I did my own troubleshooting. -
@obelsen said in DHCP fails silently, but works on reboot of pfSense:
None. In the DHCP log, only events related to new leases are present.
What about in the main system log?
@obelsen said in DHCP fails silently, but works on reboot of pfSense:
The DHCP server fails only when modifying interfaces
Do you have any special settings on that interface? Maybe a spoofed MAC address, MTU, or other similar setting either on the parent interface (if assigned) or one of the VLANs?
-
@jimp said in DHCP fails silently, but works on reboot of pfSense:
@obelsen said in DHCP fails silently, but works on reboot of pfSense:
None. In the DHCP log, only events related to new leases are present.
What about in the main system log?
Negative. No logs at all. The only items present were standard login logs and other unrelated info.
@obelsen said in DHCP fails silently, but works on reboot of pfSense:
The DHCP server fails only when modifying interfaces
Do you have any special settings on that interface? Maybe a spoofed MAC address, MTU, or other similar setting either on the parent interface (if assigned) or one of the VLANs?
The interfaces are all standard settings with a static ip defined. No MAC spoofing or other non standard configuration.
The parent interface (LAN) also had a static IP like each vlan interface. -
I would like to add that this has been an issue for around a year, and I have previously written on the subreddit for pfSense for help to no avail.
-
Can you answer the other questions I asked in my previous reply?
-
@jimp said in DHCP fails silently, but works on reboot of pfSense:
Can you answer the other questions I asked in my previous reply?
I did, forgot to put a newline :)
-
The symptoms all fit with something causing a link loop which generally only happens on certain drivers in certain situations such as changing specific settings which cause the link to drop and come back.
That triggers the link up/down scripts, which reconfigure the interfaces, which triggers a new link event, and so on.
But that scenario would log quite a lot of info in the main system log as it happens. It wouldn't happen silently.
Are the affected NICs all
igb
interfaces? -
@jimp said in DHCP fails silently, but works on reboot of pfSense:
The symptoms all fit with something causing a link loop which generally only happens on certain drivers in certain situations such as changing specific settings which cause the link to drop and come back.
That triggers the link up/down scripts, which reconfigure the interfaces, which triggers a new link event, and so on.
But that scenario would log quite a lot of info in the main system log as it happens. It wouldn't happen silently.
Are the affected NICs all
igb
interfaces?It happens both when LAN is in the rj45 port (igb) and when moved to one of the spf+ ports (ix i believe)
-
Additionally, I forgot to mention that even restarting an openvpn server caused the problem.
Openvpn does however not cause the problem itself, as an install without openvpn showed the same issues. -
Restarting OpenVPN would also trigger a restart of some services, which could land in a similar scenario depending on the circumstances.
There must be something out of the ordinary on there that triggers it, however.
What other packages are on there? Any other services on the firewall?
I'd be interested in looking at a full copy of the config.xml if possible. You can redact some private info (passwords/certs/etc) but I'd like to see as much of it as possible. You can send it in a PM or send it to
<my forum username>@pfsense.org
and you can encrypt it with GPG/PGP if you like, there is a key on public key servers for that e-mail address.