• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Packet loss when download and TCP connection error

Scheduled Pinned Locked Moved OpenVPN
13 Posts 3 Posters 577 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M
    mavenhalo
    last edited by Aug 25, 2022, 6:51 AM

    Hi,

    It's my first post in this forum.
    I have big problems with OpenVPN and NordVPN when any of my devices downloads on my network, the rate of packet loss increase and the gateway monitoring becomes down.
    When the download stops, all is immediately good.

    My pfSense version is 2.6.0 and my OpenVPN Client protocol is UDP.
    The MTU is 1500.

    So I tried to connect with TCP.
    The connection is OK, but there is always 100% of packet loss even without download.
    The OpenVPN logs in TCP mode :

    Aug 25 08:30:27	openvpn	39248	event_wait returned 1
    Aug 25 08:30:27	openvpn	39248	PO_WAIT[1,0] fd=6 rev=0x00000001 rwflags=0x0001 arg=0x002b6724
    Aug 25 08:30:27	openvpn	39248	I/O WAIT TR|Tw|SR|Sw [11/69244]
    Aug 25 08:30:27	openvpn	39248	PO_CTL rwflags=0x0001 ev=4 arg=0x002b6728
    Aug 25 08:30:27	openvpn	39248	PO_CTL rwflags=0x0001 ev=6 arg=0x002b6724
    Aug 25 08:30:27	openvpn	39248	PO_CTL rwflags=0x0001 ev=5 arg=0x002b7428
    Aug 25 08:30:27	openvpn	39248	STREAM: SET NEXT, buf=[572,0] next=[572,1659] len=-1 maxlen=1659
    Aug 25 08:30:27	openvpn	39248	write TCPv4_CLIENT: Permission denied (code=13)
    Aug 25 08:30:27	openvpn	39248	TCPv4_CLIENT write returned -1
    Aug 25 08:30:27	openvpn	39248	STREAM: WRITE 54 offset=500
    Aug 25 08:30:27	openvpn	39248	TCPv4_CLIENT WRITE [54] to [AF_INET]138.199.47.175:443: P_DATA_V2 kid=0 DATA 00000000 00009fb9 d7446586 331eead2 5e1b19fb 59012530 499c0428 127c379[more...]
    Aug 25 08:30:27	openvpn	39248	I/O WAIT status=0x0002
    

    There is no blocked traffic on the snort, pfBlocker and firewall logs.
    I didn't found solution on the net, so this is the last place where I could find help.

    G 1 Reply Last reply Aug 25, 2022, 7:34 AM Reply Quote 0
    • G
      Gertjan @mavenhalo
      last edited by Gertjan Aug 25, 2022, 7:35 AM Aug 25, 2022, 7:34 AM

      @mavenhalo

      Can you show all the OpenVPN client log lines ?
      From complete stop to running ?

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      M 1 Reply Last reply Aug 25, 2022, 7:52 AM Reply Quote 0
      • M
        mavenhalo @Gertjan
        last edited by Aug 25, 2022, 7:52 AM

        @gertjan

        Here is the log when the server stops (UDP mode) and starts (TCP mode) :

        Aug 25 09:43:31	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
        Aug 25 09:43:30	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
        Aug 25 09:43:30	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
        Aug 25 09:43:29	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
        Aug 25 09:43:29	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
        Aug 25 09:43:28	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
        Aug 25 09:42:54	openvpn	68471	Initialization Sequence Completed
        Aug 25 09:42:54	openvpn	68471	WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
        Aug 25 09:42:54	openvpn	68471	/usr/local/sbin/ovpn-linkup ovpnc5 1500 1586 10.7.2.2 255.255.255.0 init
        Aug 25 09:42:54	openvpn	68471	/sbin/route add -net 10.7.2.0 10.7.2.1 255.255.255.0
        Aug 25 09:42:54	openvpn	68471	/sbin/ifconfig ovpnc5 10.7.2.2 10.7.2.1 mtu 1500 netmask 255.255.255.0 up
        Aug 25 09:42:54	openvpn	68471	TUN/TAP device /dev/tun5 opened
        Aug 25 09:42:54	openvpn	68471	TUN/TAP device ovpnc5 exists previously, keep at program end
        Aug 25 09:42:54	openvpn	68471	ROUTE_GATEWAY 91.XX.XX.XX/255.255.255.0 IFACE=igb0 HWADDR=40:62:31:11:0e:48
        Aug 25 09:42:54	openvpn	68471	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
        Aug 25 09:42:54	openvpn	68471	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
        Aug 25 09:42:54	openvpn	68471	Data Channel: using negotiated cipher 'AES-256-GCM'
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: data channel crypto options modified
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: adjusting link_mtu to 1658
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: peer-id set
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: route-related options modified
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: route options modified
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --ifconfig/up options modified
        Aug 25 09:42:54	openvpn	68471	Socket Buffers: R=[65700->524288] S=[65700->524288]
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: compression parms modified
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
        Aug 25 09:42:54	openvpn	68471	OPTIONS IMPORT: timers and/or timeouts modified
        Aug 25 09:42:54	openvpn	68471	PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.2.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
        Aug 25 09:42:54	openvpn	68471	SENT CONTROL [fr780.nordvpn.com]: 'PUSH_REQUEST' (status=1)
        Aug 25 09:42:53	openvpn	68471	[fr780.nordvpn.com] Peer Connection Initiated with [AF_INET]138.199.47.175:443
        Aug 25 09:42:53	openvpn	68471	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
        Aug 25 09:42:53	openvpn	68471	WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
        Aug 25 09:42:53	openvpn	68471	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1636'
        Aug 25 09:42:53	openvpn	68471	VERIFY OK: depth=0, CN=fr780.nordvpn.com
        Aug 25 09:42:53	openvpn	68471	VERIFY EKU OK
        Aug 25 09:42:53	openvpn	68471	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
        Aug 25 09:42:53	openvpn	68471	Validating certificate extended key usage
        Aug 25 09:42:53	openvpn	68471	VERIFY KU OK
        Aug 25 09:42:53	openvpn	68471	VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
        Aug 25 09:42:53	openvpn	68471	VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
        Aug 25 09:42:53	openvpn	68471	VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
        Aug 25 09:42:53	openvpn	68471	VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7
        Aug 25 09:42:53	openvpn	68471	VERIFY WARNING: depth=0, unable to get certificate CRL: CN=fr780.nordvpn.com
        Aug 25 09:42:53	openvpn	68471	TLS: Initial packet from [AF_INET]138.199.47.175:443, sid=43d86a7c 77d9f5a4
        Aug 25 09:42:53	openvpn	68471	TCPv4_CLIENT link remote: [AF_INET]138.199.47.175:443
        Aug 25 09:42:53	openvpn	68471	TCPv4_CLIENT link local (bound): [AF_INET]91.XX.XX.XX:0
        Aug 25 09:42:53	openvpn	68471	TCP connection established with [AF_INET]138.199.47.175:443
        Aug 25 09:42:53	openvpn	68471	Attempting to establish TCP connection with [AF_INET]138.199.47.175:443 [nonblock]
        Aug 25 09:42:53	openvpn	68471	Socket Buffers: R=[65228->65228] S=[65228->65228]
        Aug 25 09:42:53	openvpn	68471	TCP/UDP: Preserving recently used remote address: [AF_INET]138.199.47.175:443
        Aug 25 09:42:53	openvpn	68471	Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
        Aug 25 09:42:53	openvpn	68471	Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
        Aug 25 09:42:53	openvpn	68471	WARNING: experimental option --capath /var/etc/openvpn/client5/ca
        Aug 25 09:42:53	openvpn	68471	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
        Aug 25 09:42:53	openvpn	68471	MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client5/sock
        Aug 25 09:42:53	openvpn	68215	library versions: OpenSSL 1.1.1l-freebsd 24 Aug 2021, LZO 2.10
        Aug 25 09:42:53	openvpn	68215	OpenVPN 2.5.4 amd64-portbld-freebsd12.3 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 12 2022
        Aug 25 09:42:53	openvpn	68215	WARNING: file '/var/etc/openvpn/client5/up' is group or others accessible
        Aug 25 09:42:53	openvpn	17811	SIGTERM[soft,exit-with-notification] received, process exiting
        Aug 25 09:42:53	openvpn	17811	/usr/local/sbin/ovpn-linkdown ovpnc5 1500 1584 10.8.1.4 255.255.255.0 init
        Aug 25 09:42:53	openvpn	17811	Closing TUN/TAP interface
        Aug 25 09:42:52	openvpn	17811	SIGTERM received, sending exit notification to peer
        Aug 25 09:42:52	openvpn	17811	event_wait : Interrupted system call (code=4)
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client disconnected
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'status 2'
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'state 1'
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client connected from /var/etc/openvpn/client5/sock
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client disconnected
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'status 2'
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: CMD 'state 1'
        Aug 25 09:42:11	openvpn	17811	MANAGEMENT: Client connected from /var/etc/openvpn/client5/sock
        

        And the same log when the server stops (TCP mode) and starts (UDP mode) :

        Aug 25 09:49:41	openvpn	525	Initialization Sequence Completed
        Aug 25 09:49:41	openvpn	525	WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
        Aug 25 09:49:41	openvpn	525	/usr/local/sbin/ovpn-linkup ovpnc5 1500 1584 10.8.0.2 255.255.255.0 init
        Aug 25 09:49:41	openvpn	525	/sbin/route add -net 10.8.0.0 10.8.0.1 255.255.255.0
        Aug 25 09:49:41	openvpn	525	/sbin/ifconfig ovpnc5 10.8.0.2 10.8.0.1 mtu 1500 netmask 255.255.255.0 up
        Aug 25 09:49:41	openvpn	525	TUN/TAP device /dev/tun5 opened
        Aug 25 09:49:41	openvpn	525	TUN/TAP device ovpnc5 exists previously, keep at program end
        Aug 25 09:49:41	openvpn	525	ROUTE_GATEWAY 91.XX.XX.XX/255.255.255.0 IFACE=igb0 HWADDR=40:62:31:11:0e:48
        Aug 25 09:49:41	openvpn	525	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
        Aug 25 09:49:41	openvpn	525	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
        Aug 25 09:49:41	openvpn	525	Data Channel: using negotiated cipher 'AES-256-GCM'
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: data channel crypto options modified
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: adjusting link_mtu to 1656
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: peer-id set
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: route-related options modified
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: route options modified
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: --ifconfig/up options modified
        Aug 25 09:49:41	openvpn	525	Socket Buffers: R=[42080->524288] S=[57344->524288]
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: compression parms modified
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: explicit notify parm(s) modified
        Aug 25 09:49:41	openvpn	525	OPTIONS IMPORT: timers and/or timeouts modified
        Aug 25 09:49:41	openvpn	525	PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
        Aug 25 09:49:41	openvpn	525	SENT CONTROL [fr780.nordvpn.com]: 'PUSH_REQUEST' (status=1)
        Aug 25 09:49:40	openvpn	525	[fr780.nordvpn.com] Peer Connection Initiated with [AF_INET]138.199.47.175:1194
        Aug 25 09:49:40	openvpn	525	Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
        Aug 25 09:49:40	openvpn	525	WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
        Aug 25 09:49:40	openvpn	525	WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
        Aug 25 09:49:40	openvpn	525	VERIFY OK: depth=0, CN=fr780.nordvpn.com
        Aug 25 09:49:40	openvpn	525	VERIFY EKU OK
        Aug 25 09:49:40	openvpn	525	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
        Aug 25 09:49:40	openvpn	525	Validating certificate extended key usage
        Aug 25 09:49:40	openvpn	525	VERIFY KU OK
        Aug 25 09:49:40	openvpn	525	VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
        Aug 25 09:49:40	openvpn	525	VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
        Aug 25 09:49:40	openvpn	525	VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
        Aug 25 09:49:40	openvpn	525	VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA7
        Aug 25 09:49:40	openvpn	525	VERIFY WARNING: depth=0, unable to get certificate CRL: CN=fr780.nordvpn.com
        Aug 25 09:49:40	openvpn	525	TLS: Initial packet from [AF_INET]138.199.47.175:1194, sid=f09271c1 8086d3bd
        Aug 25 09:49:40	openvpn	525	UDPv4 link remote: [AF_INET]138.199.47.175:1194
        Aug 25 09:49:40	openvpn	525	UDPv4 link local (bound): [AF_INET]91.XX.XX.XX:0
        Aug 25 09:49:40	openvpn	525	Socket Buffers: R=[42080->42080] S=[57344->57344]
        Aug 25 09:49:40	openvpn	525	TCP/UDP: Preserving recently used remote address: [AF_INET]138.199.47.175:1194
        Aug 25 09:49:40	openvpn	525	Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
        Aug 25 09:49:40	openvpn	525	Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
        Aug 25 09:49:40	openvpn	525	WARNING: experimental option --capath /var/etc/openvpn/client5/ca
        Aug 25 09:49:40	openvpn	525	NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
        Aug 25 09:49:40	openvpn	525	MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client5/sock
        Aug 25 09:49:40	openvpn	263	library versions: OpenSSL 1.1.1l-freebsd 24 Aug 2021, LZO 2.10
        Aug 25 09:49:40	openvpn	263	OpenVPN 2.5.4 amd64-portbld-freebsd12.3 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 12 2022
        Aug 25 09:49:40	openvpn	263	WARNING: file '/var/etc/openvpn/client5/up' is group or others accessible
        Aug 25 09:49:39	openvpn	68471	SIGTERM[hard,] received, process exiting
        Aug 25 09:49:39	openvpn	68471	/usr/local/sbin/ovpn-linkdown ovpnc5 1500 1587 10.7.3.5 255.255.255.0 init
        Aug 25 09:49:39	openvpn	68471	Closing TUN/TAP interface
        Aug 25 09:49:39	openvpn	68471	event_wait : Interrupted system call (code=4)
        Aug 25 09:49:39	openvpn	68471	write TCPv4_CLIENT: Permission denied (code=13)
        
        G 1 Reply Last reply Aug 25, 2022, 8:26 AM Reply Quote 0
        • G
          Gertjan @mavenhalo
          last edited by Aug 25, 2022, 8:26 AM

          @mavenhalo

          Why alternate between UDP and TCP ?
          Why not : make one works.
          Then, when done, make the other work (create a new instance)

          Your logs look fine.
          But mtu values bigger then 1500 .... are you sure ?

          Packets leaving your native WAN interface are probably a bit lower as 1500. So, encapsulated packets like the ones send to a VPN server must be smaller.

          General advise : you NordVPN is probably not using OpenVPN 2.5.4, but another version. It could even be the older 2.4.x series.
          This means you have to visit the official OpenVPN documentation, and see what you have to chose : "comp-lzo" did change in the newer 2.5.x series.

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          M 1 Reply Last reply Aug 25, 2022, 8:44 AM Reply Quote 0
          • M
            mavenhalo @Gertjan
            last edited by Aug 25, 2022, 8:44 AM

            @gertjan

            I have packets loss with UDP and can't find the solution so I try also in TCP until one of them works.

            I didn't set a MTU value bigger than 1500. I set 1500 on the OpenVPN client like the value which is in the document of NordVPN for pfSense 2.4.5.
            I set also 1500 directly on the OpenVPN interface.
            So I don't understand why there is a MTU of 1656 in the log ?

            My custom options are :

            tls-client;
            remote-random;
            tun-mtu 1500;
            tun-mtu-extra 32;
            mssfix 1450;
            persist-key;
            persist-tun;
            reneg-sec 0;
            remote-cert-tls server;
            
            G 1 Reply Last reply Aug 25, 2022, 9:18 AM Reply Quote 0
            • G
              Gertjan @mavenhalo
              last edited by Gertjan Aug 25, 2022, 9:19 AM Aug 25, 2022, 9:18 AM

              @mavenhalo said in Packet loss when download and TCP connection error:

              tls-client;

              When using a VPN 'thing', always double check the settings.
              Have a look here /var/etc/openvpn/clientx/ where x can be 1,2, etc.
              You find several files, and among them the famous config.opvn

              Open the file, and check the content.
              You will probably find a first "tls-client", as you are setting up a OpenVPN client so the next tls-client line (is part of your custom config) isn't needed.
              While you see the file, check other options for doubles and other awkward stuff.

              Remember : this is OpenVPN. Using a GUI is nice, but it always boils down to 'a config file'.

              Btw : I'm not using Nord, but Express.
              My custom settinsg are :

              remote-random;
              pull;
              comp-lzo;
              verify-x509-name Server name-prefix;
              remote-cert-tls server;
              key-direction 1;
              route-method exe;
              route-delay 2;
              tun-mtu 1500;
              fragment 1300;
              mssfix 1450;
              

              Double check the usage of :
              tun-mtu-extra 32; <= never saw this one before
              persist-key; <= probably also already included - so remove them from your custom config
              persist-tun; <= idem
              reneg-sec 0;

              If the Nord instruction are for a pfSense 2.4.5, then keep in mind that these are valid for an (very) old OpenVPN version, as said, an earlier 2.4.x.
              Try finding instructions for a more recent pfSense version (using OpenVPN 2.5.4).

              I'm a bit perplex about your mtu values. They seem 'not logic' to me.

              No "help me" PM's please. Use the forum, the community will thank you.
              Edit : and where are the logs ??

              M 1 Reply Last reply Aug 25, 2022, 10:51 AM Reply Quote 0
              • C
                Cool_Corona
                last edited by Aug 25, 2022, 9:23 AM

                How big is your bandwith and is the download using all of the bandwith??

                1 Reply Last reply Reply Quote 0
                • M
                  mavenhalo
                  last edited by Aug 25, 2022, 10:13 AM

                  I will check my config file.

                  My bandwith is about 400Mb/s down and 300Mb/s up.
                  Through the VPN, I notice a bandwith of 200Mb/s down and 120Mb/s up.

                  1 Reply Last reply Reply Quote 0
                  • M
                    mavenhalo @Gertjan
                    last edited by Aug 25, 2022, 10:51 AM

                    @gertjan

                    I have check the config file.
                    I found only these duplicate lines that I have removed from my custom options :

                    tls-client;
                    persist-key;
                    persist-tun;
                    

                    I tried to remove tun-mtu-extra, same behavior.

                    Can the problem comes from something else than the OpenVPN configuration ?

                    G 1 Reply Last reply Aug 25, 2022, 11:11 AM Reply Quote 0
                    • G
                      Gertjan @mavenhalo
                      last edited by Gertjan Aug 25, 2022, 11:36 AM Aug 25, 2022, 11:11 AM

                      @mavenhalo said in Packet loss when download and TCP connection error:

                      Can the problem comes from something else than the OpenVPN configuration ?

                      The problem is : a conflicting configuration between VPN server (Nord) and the client - pfSense.
                      As said, I'm not using Nord myself, but I have a working Express ( not sure - read on ) OpenVPN client setup.

                      When I start mine, I can't really use it, as I did not complete the routing part.
                      But, I can use the active OpenVPN client interface to ping with it :

                      70173cd6-5bba-4f05-b58d-fb62cfa2a3d8-image.png

                      The 330 ms delay is due to the fact that I'm using a VPN server from "usa-sanfrancisco-ca-version-2.expressnetw.com" which is not really in my neighbourhood ;)

                      edit :

                      nordvpn with pfSense

                      Forget about the links that mention 2.4.5 (ancient, dangerous ....) or even 2.5.0 (also old) or even 2.5.2.

                      Look for specific pfSense 2.6.0, use no other ones.

                      [Rambling : start]

                      If their is no info, then it might be the case that the OpenVPN version that Nord uses isn't the stock OpenVPN ( from here ) as that is the place where pfSEnse got it from.
                      Nord can have their own 'adapted' build as they only need to make it work with their own 'App', the one you install on your PC or Mac or Phone.
                      I didn't checked their support sites, but, if you can make it work with your 'router', then great for you. If not, they don't care, as that isn't their goal.
                      Their goals is are : Make money. Spend less on support. Tell support that they should tell the customers : install the App. For the rest, you are on your own aka non supported.

                      By now you start to understand that you can't chose a VPN by watching a Youtube video, and that there is more then 'price'.
                      (Your) questions like : "you support my router ," should be number one.

                      [Rambling : stop]

                      Still, I think OpenVPN is possible.

                      Btw : Nord supports Wiregaurd ? Never used that one myself, but give it a go, as it is waaaaaay simpler to set up.

                      Also : you have seen [https://techshielder.com/how-to-setup-and-use-nordvpn-on-pfsense](link url) I presume.

                      but you already saw that half of this :

                      0e2c8499-05b5-40f4-9294-c370316a623b-image.png

                      is a bit BS.

                      So, I tend to ask myself : what about the rest ? ;)

                      Btw : https://techshielder.com/how-to-setup-and-use-nordvpn-on-pfsense looks nice, but there are NO intermediate tests, like : when done this, test this, and it should work.
                      So you can't know what went wrong where.
                      And because you and I don't know shit about VPN anyway (I'm pretty for myself), we could also typing pure Chinese characters from a web page, we're lost.

                      Here is one for free :
                      When you reach step 12, do the ping test first as I've shown above.
                      You will know if the tunnel is up (not usable for traffic, but up) - see my example.

                      Also : who is 103.86.96.100 ? is it safe ?

                      Isn't the default resolving not just fine ? Just route all resolver traffic over the VPN connection, and done.
                      IMHO : Don't mess with DNS, the out of the box DNS works fine, things go often downhill when people start to enter their own DNS choices (and then its pfSense's fault of course).

                      edit : sorry, no mega helpful here.

                      No "help me" PM's please. Use the forum, the community will thank you.
                      Edit : and where are the logs ??

                      M 1 Reply Last reply Aug 25, 2022, 5:03 PM Reply Quote 0
                      • M
                        mavenhalo @Gertjan
                        last edited by Aug 25, 2022, 5:03 PM

                        There is something I don't understand.

                        When I download from my server, I see loss on the VPN gateway in pfSense.
                        But, is it packets loss from the data I download, or a saturation (bandwith, CPU, etc...) of pfSense with a consequence in the monitoring of the gateway ?

                        How can I know if my transfer of data had lost packets ?

                        ps : I have a Qotom with a core i5-4210U and 8GB

                        G 1 Reply Last reply Aug 26, 2022, 9:33 AM Reply Quote 0
                        • G
                          Gertjan @mavenhalo
                          last edited by Aug 26, 2022, 9:33 AM

                          @mavenhalo said in Packet loss when download and TCP connection error:

                          How can I know if my transfer of data had lost packets ?

                          When you use your VPN, start a ping like this :

                          ping www.google.com -t
                          

                          Now, do a download test with a navigator, or start downloading something big, from a source that as 'infinite' output. Try to install the WorldofTanks game from wargaming.
                          You will most probably see packet and thus ping packet loss.

                          One thing that you can't really test : the output of your VPN server, your VPN ISP, they all say they give you 'a lot'. But they actually share the outgoing bandwidth among all connected clients. And ones the pipe is full, everything gets throttled.
                          Also : the VPN is most probably UDP, and that traffic can get discared : packets (and pings) get lost. Traffic will retransmitted and re assembled to the correct info of course.

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          1 Reply Last reply Reply Quote 0
                          • C
                            Cool_Corona
                            last edited by Aug 26, 2022, 9:37 AM

                            When you fill your pipe on the VPN with a DL then packetloss will occur.

                            Everything else is getting throttled.

                            Also a normal DL on the connection that fills the pipe will see packetloss.

                            Thats why people tend to use bandwidth limiters for the services so this doesnt occur.

                            1 Reply Last reply Reply Quote 1
                            13 out of 13
                            • First post
                              13/13
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                              This community forum collects and processes your personal information.
                              consent.not_received