On Wed, Mar 5, 2025, at 9:27 AM, Rob Gerber wrote:
> 
> 
> Robert Gerber
> 402-237-8692
> r...@craeon.net
> 
> On Wed, Mar 5, 2025, 8:06 AM Dan Langille <d...@langille.org> wrote:
>> __
>> On Tue, Mar 4, 2025, at 11:03 PM, Rob Gerber wrote:
>>> I don't think that the problem is in bacula, for sure. I suspect other 
>>> traffic over the link might be similarly impacted. My searching indicated 
>>> that 0a000119 is a generic openssl error. Could be many things. I might be 
>>> suspicious of the openssl version or implementation installed on your new 
>>> router / firewall. The router or firewall may have flawed firmware.
>> 
>> Is that theory contingent upon some kind of hardware acceleration on said 
>> firewall?
> I don't know if hardware acceleration could be contributing to this. Maybe? 
>> If so, I should be able to verify that that is occurring and perhaps disable 
>> that acceleration so it's all done in software, removing the firmware from 
>> the equation.
> I agree, swap to a simpler configuration and see if it has an impact. 
>> 
>> 
>>> 
>>> Consider running wireshark to analyze failed ssl transactions.
>>> 
>>> I think I maybe got lucky when I searched this in duckduckgo. The top 
>>> result contained something sort of relevant, with further breadcrumbs to 
>>> chase. The next million results didn't even contain the 0a000119 keyword 
>>> and look unrelated.
>>> Check out this, and follow the links therein, and the links inside those 
>>> links. I have about 10 tabs open now and I see some interesting stuff. Some 
>>> people turned off segmentation offloading on their nic, others made new 
>>> certs, others got rid of their netgear router. 0a000119 is a vague error.
>>> https://forum.proxmox.com/threads/decryption-failed-or-bad-record-on-remote-sync.145131/
>> 
>> Thank you for that research. It is appreciated.
>> 
>>> Have you verified that data can be sent over the network link? I assume 
>>> yes, so what about data larger than a single packet size (ie, if a packet 
>>> is fragmented, then what happens?)? 
>> 
>> The network link of the firewall? Yes.  I think that is fine and working as 
>> expected. To test, I ran "wget 
>> https://download.freebsd.org/releases/ISO-IMAGES/14.2/FreeBSD-14.2-RELEASE-amd64-memstick.img";.
>> 
>> It completed in about 42s without errors. I verified the checksum is correct.
>> 
>>  Does that do the test you wanted? This test does not involve the VPN.
> I think that is a good test, because it does appear to verify that the 
> network is up and functional on at least one end. I meant to test through the 
> VPN, which you did in subsequent tests. However, verifying the stability and 
> function of your network on EACH end in a manner like you did here is an 
> important test, since it appears to be up, yet doesn't "just work". 
> 
> I would be curious to see if you are able to send traffic directly from host 
> to host without any VPN involved, though I think simply testing the remote 
> end's ability to download a large file successfully could be more important. 

The hosts have been in place for years. This is not a new VPN - it's been 
around about 10 years. What is new: the gateway. It was replaced. It went from 
pfSense to vanilla FreeBSD. I think I'm missing some of the magic pfSense did 
in the configuration.

I just completed a test fetch (of the same file as above) on each client.

FYI, fetch times ranged from 22s to 7.5 minutes - all hosts downloaded the file 
without error (checksum was verified to be correct).

> 
> I would want to check each end for internet connection packet loss by running 
> a continuous ping to some stable internet IP like 8.8.8.8.

Good idea. I just started: this on each host.  ping -c 1000 8.8.8.8

Alexa: time, 1000s

After the alarm, all completed like this:

--- 8.8.8.8 ping statistics ---
1000 packets transmitted, 1000 packets received, 0.0% packet loss


>> 
>> 
>> However, your suggestion made me try another test:
>> 
>> [8:42 pro02 dan ~/tmp] % time scp -r foo.example:~bar/backups/Bacula .
>> 
>> That grabs all the .bsr files I've backed up to that how. The copy involves 
>> about 2.6M and 221 files.
>> 
>> Let's try that same backup over the VPN:
>> 
>> [8:43 pro02 dan ~/tmp] % time scp -r 
>> foo.vpn.example.org:~rsyncer/backups/Bacula Bacula-vpn
>> .. about five files are copied
>> 0%    0     0.0KB/s   --:-- ETAssh_dispatch_run_fatal: Connection to 
>> 10.14.0.217 port 22: message authentication code incorrect
>> scp: Connection closed
>> scp -r foo.vpn.example.org:~rsyncer/backups/Bacula Bacula-vpn  0.21s user 
>> 0.02s system 25% cpu 0.938 total
>> 
>> To me, that says something is very wonky with the VPN.
> I agree, though I would want to test for packet loss on each end. Maybe file 
> downloads are more resilient than OpenVPN traffic and your OpenVPN session is 
> only serving as a canary here. If you have a basic network connectivity 
> issue, it'd be better to find that before you get elbows deep into openvpn 
> and troubleshooting openssl. 
> 
> I wonder if ping tests would successfully pass through the VPN. If yes, this 
> implies that small data can pass, but not bigger data. That sort of failure 
> mode, if verified, would indicate an issue when a packet is fragmented. 
> 
> If pings won't pass, then I'd wonder if you ever had a working VPN 
> configuration despite the paths appearing to be up. 

All the clients pass this test with the similar results:

1000 packets transmitted, 999 packets received, 0.1% packet loss (note: 5 of 
the 6 had 0 package loss)


> 
>> 
>> 
>> Which also means, this is not a Bacula issue but a transport issue - solve 
>> that first, and the Bacula issue should resolve.
>> 
>> Does that make sense?
> I agree with your conclusion. This appears to be a transport issue. 
>> 
>> 
>> Thank you
>> 
--
  Dan Langille
  d...@langille.org

_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to