Hi Jeff,

On 11/01/16 22:06, Jeff Boyce wrote:
> My additional diagnostic testing results are at the bottom.
>
my comments are also at the bottom ;)

> On 1/6/2016 11:38 AM, Morten Christensen wrote:
>> Den 05-01-2016 kl. 19:34 skrev Jeff Boyce:
>>> Greetings -
>>>
>>> I have a detailed description of my issue posted over on the Forum, but
>>> am not getting any responses.
>>>
>>> My issue description is posted at
>>> https://forums.openvpn.net/topic20369.html.
>>>
>>> I believe that my problem is a routing issue, but I have exhausted my
>>> avenues of research and knowledge.  I am hoping someone with an eye for
>>> routing issues might be able to spot where my issue is located and offer
>>> a recommendation.
>> I have looked at your forum description.
>> You have good chances to be on the wrong list. This looks like routing
>> problems between your other servers and their default gateway.
>>
>> What happens when you try a traceroute from the other server .53 to
>> the vpn-servers tunnel ip 10.9.8.1 ?
>>
>> Have you considered starting with the simple solution no. 3, and if
>> that works go on with no. 4 ?
>>
>> -- 
>> Morten Christensen
>>
>>
> I started with the easiest tests first.  Selva had recommended that I
> verify that the Windows client received and properly setup the pushed
> route to the 192.168.112.0/24 subnet.  The routing table on the Windows
> client before and after establishing the VPN connection is listed below.
>
> *Before VPN Connection (Windows client route print)*
> IPv4 Route Table
> ===========================================================================
> Active Routes:
> Network Destination Netmask Gateway Interface Metric
> 0.0.0.0 0.0.0.0 192.168.123.2 192.168.123.111 10
> 127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
> 127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
> 127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
> 192.168.56.0 255.255.255.0 On-link 192.168.56.1 276
> 192.168.56.1 255.255.255.255 On-link 192.168.56.1 276
> 192.168.56.255 255.255.255.255 On-link 192.168.56.1 276
> 192.168.123.0 255.255.255.0 On-link 192.168.123.111 266
> 192.168.123.111 255.255.255.255 On-link 192.168.123.111 266
> 192.168.123.255 255.255.255.255 On-link 192.168.123.111 266
> 224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
> 224.0.0.0 240.0.0.0 On-link 192.168.56.1 276
> 224.0.0.0 240.0.0.0 On-link 192.168.123.111 266
> 255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
> 255.255.255.255 255.255.255.255 On-link 192.168.56.1 276
> 255.255.255.255 255.255.255.255 On-link 192.168.123.111 266
> ===========================================================================
> Persistent Routes:
> Network Address Netmask Gateway Address Metric
> 0.0.0.0 0.0.0.0 192.168.123.2 Default
> ===========================================================================
>
> *After VPN Connection (Windows client route print)*
> C:\>ipconfig
>
> Ethernet adapter Local Area Connection 2:
>
> Connection-specific DNS Suffix . :
> Link-local IPv6 Address . . . . . : fe80::44cc:5041:5d8d:ae76%9
> IPv4 Address. . . . . . . . . . . : 10.9.8.6
> Subnet Mask . . . . . . . . . . . : 255.255.255.252
> Default Gateway . . . . . . . . . :
>
>
>   > added routes
> IPv4 Route Table
> ===========================================================================
> Active Routes:
> Network Destination Netmask Gateway Interface Metric
> 0.0.0.0 0.0.0.0 192.168.123.2 192.168.123.111 10
>   > 10.9.8.1 255.255.255.255 10.9.8.5 10.9.8.6 31
>   > 10.9.8.4 255.255.255.252 On-link 10.9.8.6 286
>   > 10.9.8.6 255.255.255.255 On-link 10.9.8.6 286
>   > 10.9.8.7 255.255.255.255 On-link 10.9.8.6 286
> 127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
> 127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
> 127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
> 192.168.56.0 255.255.255.0 On-link 192.168.56.1 276
> 192.168.56.1 255.255.255.255 On-link 192.168.56.1 276
> 192.168.56.255 255.255.255.255 On-link 192.168.56.1 276
>   > 192.168.112.0 255.255.255.0 10.9.8.5 10.9.8.6 31
> 192.168.123.0 255.255.255.0 On-link 192.168.123.111 266
> 192.168.123.111 255.255.255.255 On-link 192.168.123.111 266
> 192.168.123.255 255.255.255.255 On-link 192.168.123.111 266
> 224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
> 224.0.0.0 240.0.0.0 On-link 192.168.56.1 276
> 224.0.0.0 240.0.0.0 On-link 192.168.123.111 266
>   > 224.0.0.0 240.0.0.0 On-link 10.9.8.6 286
> 255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
> 255.255.255.255 255.255.255.255 On-link 192.168.56.1 276
> 255.255.255.255 255.255.255.255 On-link 192.168.123.111 266
>   > 255.255.255.255 255.255.255.255 On-link 10.9.8.6 286
> ===========================================================================
> Persistent Routes:
> Network Address Netmask Gateway Address Metric
> 0.0.0.0 0.0.0.0 192.168.123.2 Default
> ===========================================================================
>
> This appears to be correct.
>
> Next, I followed the suggestion by Gert to run Wireshark on the TUN
> interfaces.  So I started with the TUN interface on the Windows client box.
>
> *Wireshark on remote Windows Client during ping to 192.168.112.53
> *
> No. Time Source Destination Protocol Info
> 1 16:14:13.608219 10.9.8.6 192.168.112.53 ICMP Echo (ping) request
> (id=0x0001, seq(be/le)=21/5376, ttl=128)
> Frame 1: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
> Ethernet II, Src: 00:ff:dc:92:57:17 (00:ff:dc:92:57:17), Dst: 10.9.8.5
> (00:ff:dd:92:57:17)
> Internet Protocol, Src: 10.9.8.6 (10.9.8.6), Dst: 192.168.112.53
> (192.168.112.53)
> Internet Control Message Protocol
>
> No. Time Source Destination Protocol Info
> 2 16:14:13.665459 10.9.8.1 10.9.8.6 ICMP Destination unreachable (Host
> administratively prohibited)
> Frame 2: 102 bytes on wire (816 bits), 102 bytes captured (816 bits)
> Ethernet II, Src: 10.9.8.5 (00:ff:dd:92:57:17), Dst: 00:ff:dc:92:57:17
> (00:ff:dc:92:57:17)
> Internet Protocol, Src: 10.9.8.1 (10.9.8.1), Dst: 10.9.8.6 (10.9.8.6)
> Internet Control Message Protocol
>
> < repeated 4 times >
>
> Reading this output, the "host administratively prohibited" phrase
> caught my attention, as it implied to me that the system knew the proper
> routing, but that the packet was being administratively blocked (ie., by
> a firewall).  So then I had to figure out which firewall, on which box
> within the packet route was causing the problem.  Looking back at my
> original post I had listed the firewall rules on the VPN box and
> speculated that I might need an accept rule on the Forward Chain.  So I
> took a shot and changed the default setting on the Forward Chain of my
> VPN box to ACCEPT ALL, rather than DENY ALL.  Once I made that change I
> could ping any box on the LAN behind the VPN box.  Examples below.
> *
> **Pings from remote Windows Client connected to VPN*
> C:\HomeFiles>ping 192.168.112.53  (other server behind VPN server)
> Pinging 192.168.112.53 with 32 bytes of data:
> Reply from 192.168.112.53: bytes=32 time=57ms TTL=62
> Reply from 192.168.112.53: bytes=32 time=53ms TTL=63
> Reply from 192.168.112.53: bytes=32 time=54ms TTL=63
> Reply from 192.168.112.53: bytes=32 time=56ms TTL=63
> Ping statistics for 192.168.112.53:
> Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
> Approximate round trip times in milli-seconds:
> Minimum = 53ms, Maximum = 57ms, Average = 55ms
>
> C:\HomeFiles>ping 192.168.112.101  (desktop box behind VPN server)
> Pinging 192.168.112.101 with 32 bytes of data:
> Reply from 192.168.112.101: bytes=32 time=57ms TTL=126
> Reply from 192.168.112.101: bytes=32 time=59ms TTL=127
> Reply from 192.168.112.101: bytes=32 time=55ms TTL=127
> Reply from 192.168.112.101: bytes=32 time=57ms TTL=127
> Ping statistics for 192.168.112.101:
> Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
> Approximate round trip times in milli-seconds:
> Minimum = 55ms, Maximum = 59ms, Average = 57ms
Excellent news!
> Now, I don't want to leave my firewall with a default Accept All setting
> on the forwarding chain, so I need to identify a rule specific to the
> packet type / traffic that I want to allow.  I am little less
> knowledgeable on firewall rules than routing so if someone could provide
> a suggestion here I would appreciate it.  I tried making a rule that
> allowed all UDP TUN traffic, but that blocked my ping again.  I think
> then I tried adding a port specific rule, but that didn't help either.
> At that point I ran out of time to conduct any additional tests.
>
> If someone can point me in the right direction to create a specific
> firewall rule for the forward chain I would be grateful.  My thoughts
> right now are that maybe that previous detailed Wireshark capture will
> help me identify the specifications for a firewall rule (have to go back
> and look at that again).  Once I get this all figured out I will post a
> complete summary back to my original forum post so that others may
> benefit from my educational experience. Thanks.
>
If you want to allow all traffic to and from the tun network(s) to be 
forwarded then add something like

   iptables -A FORWARD -i tun+ -j ACCEPT
   iptables -A FORWARD -o tun+ -j ACCEPT

remember that when forwarding traffic you need to write rules for both 
incoming and outgoing traffic.

HTH,

JJK


------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to