Hi,

On 27/06/18 09:30, free...@tango.lu wrote:
Hello List,

There is this issue bugging me since a long time and try to put a stop to it:

[22444423.820856] br0: received packet on tap0 with own address as source address [22444423.821068] br0: received packet on tap0 with own address as source address [22444423.844718] br0: received packet on tap0 with own address as source address [22444423.844952] br0: received packet on tap0 with own address as source address [22444423.868796] br0: received packet on tap0 with own address as source address
[22444435.110486] net_ratelimit: 8 callbacks suppressed
[22444435.110489] br0: received packet on tap0 with own address as source address [22444435.178721] br0: received packet on tap0 with own address as source address


Getting it in the kernel log of one of my servers. This is a Layer 2 ethernet bridge setup. This issue does not cause any outage, extra traffic, slowdown, broadcast storm or whatever, the communication is all OK but I keep getting these messages once in a while in the servers dmesg and would like them to go away by actually finding the root cause and fixing the problem.

My setup is a bit complex but I narrow it down to this:

Server |BR0| == tap0 + tap1

Client1 |BR0| == tap0 + eth0
Client2 |BR0| == tap0 + eth0

the 2 taps go to 2 another locations where they are bridged into the local eth0 therefore bridging 3 networks together.
The config is the same on both sides.

Server Configs are for 2 separate openvpn daemons:

dev tap0
server-bridge 10.20.20.1 255.255.255.0 10.20.20.11 10.20.20.22
tls-server
tls-auth ta.key 0
client-to-client
dh dh2048.pem
ca ca.crt
cert server.crt
key server.key
port 4000
comp-lzo
keepalive 10 120
mute-replay-warnings

with slightly different IP ranges. Note, these ranges just for the configuration to work, the actual ip range will be 192.168.5.x assigned to br0 on the endpoints. But as I noticed this does not cause the issue I can go and reconfigure tap0 on the endpoints to 0.0.0.0 and still keep getting these messages on the main server.

ouch, bridging on both sides is asking for trouble ...
you'll need to figure out what kind of traffic is received on the local bridge - right now, you don't even know if it's coming from the LAN side or the VPN side. I'd run tcpdump on the bridge (or both LAN+tap adapters) to watch for any incoming traffic with the source address set to the bridge address.  Only when you know what kind of traffic it is, will we be able to tell anything on whether it can be stopped at all.

HTH,

JJK


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to