Am 12.07.2017 um 15:41 schrieb Patrick Matthäi:

Hi,

>>> we have got the same issue with all our VPNs upgraded to Stretch now.
>>> Most VPNs are connected about a 1 GBit/s datacenter connection with each
>>> other (also same LAN), the other ones are connected about a 100 MBit/s
>>> connection.
>>
>>> route remote_host 255.255.255.255 net_gateway
>> This suggests that the VPN server is inside the netblocks routed through
>> the tunnel, right?
> If I understood you correct: yes - all VPNs are "clients"

No, the question is whether the outer IP address (the IP address of the
VPN server, "remote_host" here) is within the network that is routed
through the VPN tunnel.

Example:
VPN-Server at 10.1.1.1
routed network 10.0.0.0/8

A client has a wired connection with a default route to 1.1.1.1

default via 1.1.1.1 dev eth0

You can reach 10.1.1.1 through that default route. However, when the
tunnel is established the routing table would look like this

default via 1.1.1.1 dev eth0
10.0.0.0/8 via tun0

Traffic to 10.1.1.1 would be sent to tun0, encapsulated in OpenVPN into
a packet to 10.1.1.1, which would be sent to tun0, ...

So the statement above would create a more-specific route for the remote
address through the wired connection

default via 1.1.1.1 dev eth0
10.0.0.0/8 via tun0
10.1.1.1/32 via 1.1.1.1 dev eth0

The problem is, when eth0 flaps both routes are deleted, but only the
default route is recreated. So you end up with the described internal
routing loop until you restart OpenVPN (which recreates the /32 route).

> I also uploaded the current testing version to stretch-bpo and deployed
> it on one host, to see if there is a difference later

Ah, I was already wondering who did.

Bernhard

Reply via email to