Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#30638 - [netcfg] tuntap connections leaving interface down
Attached to Project:
Arch Linux
Opened by Gufo (gufo) - Wednesday, 11 July 2012, 14:21 GMT
Last edited by Jouke Witteveen (jouke) - Thursday, 26 July 2012, 13:55 GMT
Opened by Gufo (gufo) - Wednesday, 11 July 2012, 14:21 GMT
Last edited by Jouke Witteveen (jouke) - Thursday, 26 July 2012, 13:55 GMT
|
DetailsDescription:
After a system upgrade and a reboot my VPN setup stopped working. The full description with a possible workaround follows, but action should be taken to fix the bug (possibly in netcfg directly) I have a tap interfaces my openvpn instance relies upon. It's defined as follow in /etc/network.d/tap0: INTERFACE='tap0' CONNECTION='tuntap' MODE='tap' USER='nobody' GROUP='nobody' and correctly configured to be started up at boot in rc.conf (amongst other): NETWORKS=(tap0 intra extra) I upgraded the system today, current netcfg version 2.8.5-3 and kernel is: $uname -a Linux bastione 3.4.4-2-ARCH #1 SMP PREEMPT Sun Jun 24 17:28:37 UTC 2012 i686 GNU/Linux after a reboot my VPN stopped properly working, the client could get an IP address (strangely enough, and via a DHCP server listening on the bridge interface tap0 is part of) BUT COULD NOT work properly on the local lan. To fix the problem I had to manually issue (on the server of course) sudo ifconfig tap0 up Right after launching the command my client started working in the LAN, without the need to restart openvpn neither on the client nor on the server. tcpdump was also refusing to dump traffic on that interface before enabling it. Steps to reproduce: My system is acting as a firewall, clients connect to the VPN as part of set up openvpn to use tap0, which is created automatically at boot via netcfg add tap0 as a brige with eth0 using netcfg restart the system confirm that before manually forcing tap0 up the client cannot connect properly to services hosted at eth0 |
This task depends upon
Closed by Jouke Witteveen (jouke)
Thursday, 26 July 2012, 13:55 GMT
Reason for closing: Fixed
Additional comments about closing: a0b9e
Thursday, 26 July 2012, 13:55 GMT
Reason for closing: Fixed
Additional comments about closing: a0b9e
SKIPNOCARRIER='yes'
to your profile?
$ sudo tcpdump -i tap0
tcpdump: tap0: That device is not up
$ sudo ifconfig tap0 up
$ sudo tcpdump -i tap0
tcpdump: WARNING: tap0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on tap0, link-type EN10MB (Ethernet), capture size 65535 bytes
22:20:19.845983 IP 10.10.170.89.db-lsp-disc > 255.255.255.255.db-lsp-disc: UDP, length 142
netcfg all-down
NETCFG_DEBUG=yes netcfg up tap0
netcfg all-down
NETCFG_DEBUG=yes netcfg up tap0
was:
Using /etc/rc.conf for netcfg settings is deprecated.
Use /etc/conf.d/netcfg instead.
:: extra down [done]
:: tap0 down [done]
:: tap1 down [done]
:: intra down [done]
:: dmz down [done]
Using /etc/rc.conf for netcfg settings is deprecated.
Use /etc/conf.d/netcfg instead.
:: tap0 up Interface tap0 already exists.
[fail]
:: extra down [done]
:: intra down [done]
:: tap1 down [done]
:: tap0 down [done]
:: tap0 up Interface tap0 already exists.
[fail]
same output even when migrated to /etc/conf.d/netcfg
Thanks a lot for your input jouke!
I'll investigate this and see if I can come up with a solution, it's a headless system so it's not extremely easy to play with the network and get the results so it can take a while.
ip tuntap del "$INTERFACE" mode "$MODE" &>/dev/null
which should remove the interface, but somehow
/sys/class/net/tap0
appears to persist.
Perhaps the above ip command without the redirect to /dev/null can shed some light on this. The whole tuntap logic doesn't seem very complicated, but apparently I'm overseeing the bug.
http://projects.archlinux.org/netcfg.git/tree/src/connections/tuntap
ip tuntap del *dev* "$INTERFACE" mode "$MODE" &>/dev/null
if I understand correctly
/usr/lib/network/connections/tuntap
then we can get back to fixing the original bug ;-).
/usr/lib/network/connections/tuntap
with the attached version. Please let me know.
Thanks for your time ;)
[if you open gtalk you have a pending contact req. from me]