Hello,

As it was stated by the DEVs that the bridged networking will be removed from OpenVPN in the future I think that will leave a lot of us who were using this with looking for cheap OpenSource alternatives because sooner or later if a software becomes out of date with security vulnerabilities ppl are forced to switch even if it's perfectly working like a ZX80 calculator. Let's not go into why do DEVs think that layer2 bridges are bad just discuss (maybe better) currently available OpenSource alternatives.

One alternative is IPSEC TRANSPORT MODE but it becomes a hassle when one or more ends are behind NAT routers (which is the case almost always nowadays) and as far as I understood it does not provide superior security over OpenVPN.


EoIP this seems to be a Mikrotik proprietary protocol.

https://wiki.mikrotik.com/wiki/Manual:Interface/EoIP

I will skip on the *Cisco* solutions since they are all proprietary, commercial.




For ending I will discuss an interesting behavior with a bridging setup of OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 9 2018.


I twas like a 3 location VPN bridge kept up by same openvpn versions. On one location a network with bogous ARP traffic was plugged into the network causing it to send non related ARP flow of about 100-200K/s also generating 300MB firewall logs per day on the devices LEN=94 TOS=0x08 PREC=0x80 TTL=61 ID=16892 DF PROTO=UDP SPT=43849 DPT=161 LEN=74. Anyway the most of the traffic was not IP but just pure ARP hitting the Broadcast address who has address 172.30.52.31 ETC. Not even related to the IP ranges used on the VPN.

Now we talking about 100mbit/s WAN links so a 100-200K/s UDP flow is peanuts regardless this traffic caused OpenVPN (or the Linux kernel?) to start to go nuts.

According to this:

http://yurisk.info/2009/12/15/arp-table-overflow-in-checkpoint-nad-linux-in-general/index.html

I would get: "kernel: Neighbour table overflow." this was not the case, there was no overflow here however machines on the different segments failed to resolve hardware addresses of machines on other segments and even adding them manually as static ARP entries on those nodes didn't work. Killing and restarting OpenVPN on the nodes partially worked for a while.

After the bad traffic was shutdown and all the routers (or in this case better call them BRIDGES) running OpenVPN were rebooted everything went back to normal.






_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to