Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Selective routing over openVPN

    Scheduled Pinned Locked Moved Routing and Multi WAN
    3 Posts 2 Posters 2.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • X
      xopah
      last edited by

      Hi folks!

      I have got an issue with selective routing over openVPN.
      The tunnel is working fine and is up and stable.
      I want to route a /24 IP range over the tunnel out on the net on the openVPN server side.

      The route is pushed out from openVPN server.
      Traceroute from openvpn client pfsense works.
      Traceroute from local client behind pfsense client does not work.
      Pfsense version:
      2.0-RELEASE (i386)
      built on Tue Sep 13 17:28:43 EDT 2011

      Packet capture on pfsense client gives:

      20:23:45.700473 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8520, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55757 > xzy.com.http: Flags [s], cksum 0xf795 (correct), seq 2840697305, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:23:48.706961 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8531, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55757 > xzy.com.http: Flags [s], cksum 0xf795 (correct), seq 2840697305, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:23:48.847735 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8532, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55758 > xzy.com.http: Flags [s], cksum 0xd864 (correct), seq 3951720144, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:23:51.857434 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8534, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55758 > xzy.com.http: Flags [s], cksum 0xd864 (correct), seq 3951720144, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:23:54.707535 AF IPv4 (2), length 52: (tos 0x0, ttl 127, id 8541, offset 0, flags [DF], proto TCP (6), length 48)
          computer.client.local.55757 > xzy.com.http: Flags [s], cksum 0x0b9f (correct), seq 2840697305, win 8192, options [mss 1460,nop,nop,sackOK], length 0
      20:23:57.851569 AF IPv4 (2), length 52: (tos 0x0, ttl 127, id 8542, offset 0, flags [DF], proto TCP (6), length 48)
          computer.client.local.55758 > xzy.com.http: Flags [s], cksum 0xec6d (correct), seq 3951720144, win 8192, options [mss 1460,nop,nop,sackOK], length 0
      20:24:06.708467 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8560, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55759 > xzy.com.http: Flags [s], cksum 0x25ef (correct), seq 2272562523, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:24:09.710254 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8562, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55759 > xzy.com.http: Flags [s], cksum 0x25ef (correct), seq 2272562523, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:24:15.706521 AF IPv4 (2), length 52: (tos 0x0, ttl 127, id 8570, offset 0, flags [DF], proto TCP (6), length 48)
          computer.client.local.55759 > xzy.com.http: Flags [s], cksum 0x39f8 (correct), seq 2272562523, win 8192, options [mss 1460,nop,nop,sackOK], length 0
      20:24:27.713565 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8583, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55762 > xzy.com.http: Flags [s], cksum 0x57ae (correct), seq 1355911740, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:24:30.714143 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8585, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55762 > xzy.com.http: Flags [s], cksum 0x57ae (correct), seq 1355911740, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:24:36.708892 AF IPv4 (2), length 52: (tos 0x0, ttl 127, id 8591, offset 0, flags [DF], proto TCP (6), length 48)
          computer.client.local.55762 > xzy.com.http: Flags [s], cksum 0x6bb7 (correct), seq 1355911740, win 8192, options [mss 1460,nop,nop,sackOK], length 0
      20:24:48.721856 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8606, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55764 > xzy.com.http: Flags [s], cksum 0x8e39 (correct), seq 669025440, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:24:51.718478 AF IPv4 (2), length 56: (tos 0x0, ttl 127, id 8613, offset 0, flags [DF], proto TCP (6), length 52)
          computer.client.local.55764 > xzy.com.http: Flags [s], cksum 0x8e39 (correct), seq 669025440, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
      20:24:57.710189 AF IPv4 (2), length 52: (tos 0x0, ttl 127, id 8618, offset 0, flags [DF], proto TCP (6), length 48)
          computer.client.local.55764 > xzy.com.http: Flags [s], cksum 0xa242 (correct), seq 669025440, win 8192, options [mss 1460,nop,nop,sackOK], length 0
      
      What am I doing wrong here?
      Is it a firewall rule I have overlooked?
      [/s][/s][/s][/s][/s][/s][/s][/s][/s][/s][/s][/s][/s][/s][/s]
      
      1 Reply Last reply Reply Quote 0
      • X
        xopah
        last edited by

        Im here to post a small update as my serch for get the problem solved continues, but have not heard anything word from here yet.

        Apparently the server pfsense tries to answer my client mashine:

         15:16:52.719307 IP 192.168.10.XX.36926 > XX.XX.XX.XX.33437: UDP, length 32
        15:16:52.719366 IP 10.0.46.1 > 192.168.10.XX: ICMP time exceeded in-transit, length 36
        

        It says:

        The Time Exceeded Message is an ICMP message which is generated by a gateway to inform the source of a discarded datagram due to the time to live field reaching zero.

        IS there a routing loop that Im unaware of?

        Pinging…

        15:39:00.409877 IP 192.168.XX.XX > XX.XX.XX.XX: ICMP echo request, id 46352, seq 172, length 64
        15:39:01.410151 IP 192.168.XX.XX > XX.XX.XX.XX: ICMP echo request, id 46352, seq 173, length 64
        15:39:02.467118 IP 192.168.XX.XX > XX.XX.XX.XX: ICMP echo request, id 46352, seq 174, length 64
        

        No answer at all!

        • And the same issue with forwarding google.

        Updated pfsense to 2.0.1 release
        Still same issue.

        It seems like the packets goes out from the openVPN server side WAN but does not get any answer.
        And the two pfsense routers seems to get different IP's from the DNS server for the same domain name.

        So I'm still not able to route the /24 net out on a different WAN through a openVPN tunnel.

        any suggestions would be awsome!
        Thanks!

        1 Reply Last reply Reply Quote 0
        • C
          cmb
          last edited by

          You definitely have a routing loop somewhere, not enough details there to tell you where.

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.