Launchpad has imported 26 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=1892283.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2020-10-28T11:54:27+00:00 benedikt wrote:

Description of problem:

When using NetworkManager to connect to a VPN where OpenVPN pushes DNS
configuration from the server (via the dhcp-option setting), these
servers are correctly added to /etc/resolv.conf. However, since Fedora
33, the default for name resolution is systemd-resolved, which appears
to ignore /etc/resolv.conf and the configured name servers are not used.

Version-Release number of selected component (if applicable):

NetworkManager-openvpn-1:1.18.12-1.fc33.1

How reproducible:

Always

Steps to Reproduce:
1. Connect to an OpenVPN network that configures custom name servers via 
dhcp-option
2. Observe that these name servers are added to /etc/resolv.conf
3. Try to resolve internal names only served by the custom name servers

Actual results:

Name resolution fails as systemd-resolved ignores the configured name
servers

Expected results:

The configured name servers are used and internal names resolve
successfully

Additional info:

As a workaround, systemd-resolved can be circumvented by adding
"dns=default" to the [main] section in
/etc/NetworkManager/NetworkManager.conf

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/4

------------------------------------------------------------------------
On 2020-10-28T12:26:16+00:00 jan.public wrote:

Confirming this with an openswan VPN on a freshly to Fedora 33 upgraded system.
The DNS servers provided by the VPN are added to the /etc/resolv.conf
nslookup can resolve VPN internal host names.
Browsers state that they cannot find the site.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/5

------------------------------------------------------------------------
On 2020-10-28T12:38:57+00:00 jan.public wrote:

The suggested workaround to add dns=default to the [main] section in
/etc/NetworkManager/NetworkManager.conf does not solve the issue that
the browsers cannot resolve the internal host names in my case.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/6

------------------------------------------------------------------------
On 2020-10-28T12:54:21+00:00 thaller wrote:

there are various ways how DNS (with or without NetworkManager) can be
configured.

Also, it doesn't seem you are using the default configuration of Fedora
33, where systemd-resolved is used. So, to fully understand the problem,
you would have to provide how your system is configured.

For example,

with systemd-resolved, commonly /etc/resolv.conf would be symlinked to a
file as explained in `man systemd-resolved`. In that case systemd-
resolved will mostly ignore /etc/resolv.conf, and /etc/resolv.conf is
commonly not used by glibc resolver (which -- depending on your
configuration -- uses NSS modules to directly talk to systemd-resolved
(`man nsswitch.conf`)). Thus the symlinked /etc/resolv.conf is mostly
not used, but see how this works in `man systemd-resolved`.

Anyway. You need to share how exactly your system is configured.

Possibly, just collect a complete level=TRACE log that shows the issue.
Read
https://cgit.freedesktop.org/NetworkManager/NetworkManager/tree/contrib/fedora/rpm/NetworkManager.conf#n28
for hints about logging (and note the comment about private data in log
files).

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/7

------------------------------------------------------------------------
On 2020-10-28T14:03:47+00:00 benedikt wrote:

The system I am working with has been upgraded from F32.
/etc/resolv.conf is a symlink to /var/run/NetworkManager/resolv.conf. It
seems to me that in this case systemd-resolved should be in "consumer"
mode and use the nameservers provided there (as stated in the fourth
bullet point in the /etc/resolv.conf section of the systemd-resolved man
page), but that doesn't seem to happen.

If I use any of the other options listed in that manpage as link targets
for /etc/resolv.conf, and connect to the VPN, name resolution for
internal names still fails. systemd-resolved doesn't seem to learn about
the new servers, so the stub resolver won't resolve those names, and
they don't get added to /run/systemd/resolve/resolv.conf either.
/var/run/NetworkManager/resolv.conf appears to be the only place where
they show up.

My nsswitch.conf provides the following configuration for gethostbyname:
files mdns4_minimal [NOTFOUND=return] resolve [!UNAVAIL=return]
myhostname dns

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/8

------------------------------------------------------------------------
On 2020-10-28T16:56:12+00:00 jan.public wrote:

I did some testing with the following command:
# resolvectl dns

This are the results is different situations:
No VPN, IPv6 enabled (automatic):
# resolvectl dns
Global: 84.116.46.21 84.116.46.20 2001:b88:1002::10 2001:b88:1202::10 
2001:730:3e42:1000::53
Link 2 (enp35s0): 84.116.46.21 84.116.46.20 2001:b88:1002::10 2001:b88:1202::10 
2001:730:3e42:1000::53
Link 3 (virbr1):
Link 4 (virbr1-nic):
Link 5 (virbr0):
Link 6 (virbr0-nic):

VPN enabled, IPv6 enabled (automatic):
# resolvectl dns
Global: 192.168.253.4 192.168.253.5 84.116.46.21 84.116.46.20 2001:b88:1002::10 
2001:b88:1202::10 2001:730:3e42:1000::53
Link 2 (enp35s0): 84.116.46.21 84.116.46.20
Link 3 (virbr1):
Link 4 (virbr1-nic):
Link 5 (virbr0):
Link 6 (virbr0-nic):

No VPN, IPv6 disabled:
# resolvectl dns
Global: 84.116.46.21 84.116.46.20
Link 2 (enp35s0): 84.116.46.21 84.116.46.20
Link 3 (virbr1):
Link 4 (virbr1-nic):
Link 5 (virbr0):
Link 6 (virbr0-nic):

VPN enabled, IPv6 disabled:
# resolvectl dns
Global: 192.168.253.4 192.168.253.5 84.116.46.21 84.116.46.20
Link 2 (enp35s0): 84.116.46.21 84.116.46.20
Link 3 (virbr1):
Link 4 (virbr1-nic):
Link 5 (virbr0):
Link 6 (virbr0-nic):

The DNS servers provided by the VPN are: 192.168.253.4,192.168.253.5
My /etc/resolv.conf is a symbolic link to /var/run/NetworkManager/resolv.conf
I also upgraded from Fedora 32 to Fedora 33.
I still have another computer running Fedora 32, where the DNS for resolving 
VPN host works fine. So I can do some tests or comparisons if this would help.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/9

------------------------------------------------------------------------
On 2020-10-28T21:21:39+00:00 thaller wrote:

@Michael, does this ring a bell?

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/10

------------------------------------------------------------------------
On 2020-10-28T21:30:56+00:00 mcatanza wrote:

(In reply to Benedikt Gollatz from comment #4)
> The system I am working with has been upgraded from F32. /etc/resolv.conf is
> a symlink to /var/run/NetworkManager/resolv.conf. It seems to me that in
> this case systemd-resolved should be in "consumer" mode and use the
> nameservers provided there (as stated in the fourth bullet point in the
> /etc/resolv.conf section of the systemd-resolved man page), but that doesn't
> seem to happen.

OK, in this mode, systemd-resolved should indeed be in consumer mode. It
should try each server listed in /etc/resolv.conf one at a time. If the
first-listed server says the name doesn't exist, then it stops and will
not check with the next server.

Have you both *intentionally* configured that setup? I highly recommend
deleting /etc/resolv.conf and symlinking it to
../run/systemd/resolve/stub-resolv.conf. This is Fedora's default
configuration, and is *much* better supported. I haven't invested any
effort into testing non-default configurations.

I understand that some users who have upgraded from much older Fedora
releases might wind up with /etc/resolv.conf ->
/var/run/NetworkManager/resolv.conf with no user interaction. If so,
that's a Fedora bug, and we should probably one-time clobber that
configuration in an upgrade scriptlet to ensure everyone who hasn't
intentionally manually configured /etc/resolv.conf should get
/etc/resolv.conf -> ../run/systemd/resolve/stub-resolv.conf.

> If I use any of the other options listed in that manpage as link targets for
> /etc/resolv.conf, and connect to the VPN, name resolution for internal names
> still fails. systemd-resolved doesn't seem to learn about the new servers,
> so the stub resolver won't resolve those names, and they don't get added to
> /run/systemd/resolve/resolv.conf either. /var/run/NetworkManager/resolv.conf
> appears to be the only place where they show up.

Hmmm, that is weird. Can you please post the output of 'resolvectl
domain' and 'resolvectl dns'? My suspicion is you don't have DNS domains
configured properly. NetworkManager should handle that for you so you
don't have to think about it, but I guess somehow it's not happening....

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/11

------------------------------------------------------------------------
On 2020-10-29T08:36:30+00:00 jan.public wrote:

Yesterday, I had host name resolution shortly working after fiddling with 
nsswitch.conf IIRC. I noticed that I had also an /etc/nsswitch.conf.rpmnew file 
with date: 2020-08-06.
After rebooting my resolving of inner VPN hosts does not work any more. 
Unfortunately, I'm not experienced in this area, apologies for the vague 
report, but I hope it might give you some hints.
It could be that in the past I made changes to the nsswitch.conf, and that that 
file was not updated any more because of this. I have been using and updating 
my current system from many Fedora version back.

My nsswitch.conf.rpmnew contains this line:
hosts:      files dns myhostname

My current is now a copy of the nsswitch.conf.rpmnew, but I modified the hosts: 
line to:
hosts:      files resolve myhostname
In this configuration inner VPN host names do not resolve

Just now I changed the line back to:
hosts:      files dns myhostname
I did:
# systemctl restart NetworkManager
Connected the VPN again via the GUI (first time I got an error, second time was 
successful)
# resolvectl dns
Global: 192.168.253.4 192.168.253.5 84.116.46.21 84.116.46.20
Link 2 (enp35s0): 84.116.46.21 84.116.46.20
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (virbr1):
Link 6 (virbr1-nic):
# resolvectl domain
Global:
Link 2 (enp35s0): ~.
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (virbr1):
Link 6 (virbr1-nic):
But the dns does not work for VPN internal hosts.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/12

------------------------------------------------------------------------
On 2020-10-29T08:57:42+00:00 benedikt wrote:

I don't remember changing the /etc/resolv.conf symlink; my guess is that
the symlink remains unchanged when upgrading from an earlier version of
Fedora. The internal nameservers get added to the top, so that shouldn't
be the issue.

When connecting to the VPN, resolvectl domain says the following,
irrespective of the /etc/resolv.conf symlink.

Global:
Link 2 (wlp58s0): ~.
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (tun0):

If I use /var/run/NetworkManager/resolv.conf, resolvectl dns says this:

Global: <VPN nameservers> <default nameservers>
Link 2 (wlp58s0): <default nameservers>
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (tun0):

However, if i use the stub resolver, the VPN nameservers do not show up
at all:

Global:
Link 2 (wlp58s0): <default nameservers>
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 6 (tun0):

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/13

------------------------------------------------------------------------
On 2020-10-29T18:23:41+00:00 mcatanza wrote:

(In reply to Jan Vlug from comment #8)
> Yesterday, I had host name resolution shortly working after fiddling with
> nsswitch.conf IIRC.

Did you read the warning telling you not to edit it at that top of that
file? If you modified it outside authselect, you'll want to regenerate
it to get back to a consistent state:

# authselect apply-changes --force

Otherwise future authselect operations will fail.

The hosts like in /etc/nsswitch should look like this:

hosts: files mdns4_minimal [NOTFOUND=return] resolve [!UNAVAIL=return]
myhostname dns

If you want to change it, you need to edit /etc/authselect/user-
nsswitch.conf. Never edit /etc/nsswitch.conf directly.

(In reply to Jan Vlug from comment #8)
> Just now I changed the line back to:
> hosts:      files dns myhostname

This is legacy mode. nss-dns will read /etc/resolv.conf instead of
talking directly to systemd-resolved. There's no good reason to do that,
so I recommend switching back to our defaults.

> # systemctl restart NetworkManager
> Connected the VPN again via the GUI (first time I got an error, second time
> was successful)
> # resolvectl dns
> Global: 192.168.253.4 192.168.253.5 84.116.46.21 84.116.46.20
> Link 2 (enp35s0): 84.116.46.21 84.116.46.20
> Link 3 (virbr0):
> Link 4 (virbr0-nic):
> Link 5 (virbr1):
> Link 6 (virbr1-nic):
> # resolvectl domain
> Global:
> Link 2 (enp35s0): ~.
> Link 3 (virbr0):
> Link 4 (virbr0-nic):
> Link 5 (virbr1):
> Link 6 (virbr1-nic):
> But the dns does not work for VPN internal hosts.

I'm confused. You have no VPN interfaces here. Is your VPN enabled? Why
is there no tun interface?

You have only one DNS domain -- the global domain ~. -- so all your DNS
should go to 84.116.46.21 or 84.116.46.20. Those are public addresses,
so no surprise that you're unable to use public DNS servers to resolve
internal names.

Likely as not, your case is a separate problem from Benedikt's. Since
you've been doing some custom configuration, I'm not convinced there's a
software bug here.

(In reply to Benedikt Gollatz from comment #9)
> I don't remember changing the /etc/resolv.conf symlink; my guess is that the
> symlink remains unchanged when upgrading from an earlier version of Fedora.
> The internal nameservers get added to the top, so that shouldn't be the
> issue.

Well... it's not the issue, but it also doesn't make sense. You really
want /etc/resolv.conf to only list systemd-resolved itself, 127.0.0.53.
Otherwise you're going to have inconsistent behavior. Applications that
read /etc/resolv.conf directly will ignore your DNS settings configured
by NetworkManager and systemd-resolved.

I suspect this is a NetworkManager packaging bug. I suspect the
NetworkManager package previously symlinked /etc/resolv.conf to
/var/run/NetworkManager/resolv.conf. We probably need a scriptlet
somewhere to clean this up, probably in the NetworkManager package, or
perhaps in the systemd package. So while I do think we have a Fedora bug
here, that also doesn't explain what's going wrong for you.

> When connecting to the VPN, resolvectl domain says the following,
> irrespective of the /etc/resolv.conf symlink.
> 
> Global:
> Link 2 (wlp58s0): ~.
> Link 3 (virbr0):
> Link 4 (virbr0-nic):
> Link 5 (tun0):

This is a problem. ~. means all your DNS is sent to the DNS server
corresponding to wlp58s0. What you want to see would be either this
(Example 1):

Global:
Link 2 (wlp58s0):
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (tun0): ~.

which means "all DNS should go to the VPN," or perhaps this (Example 2):

Global:
Link 2 (wlp58s0): ~.
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (tun0): example.com

which means "example.com DNS goes to the VPN, all other DNS goes to
interface DNS." Example 1 corresponds to NetworkManager's default
settings (good for public VPN services), and Example 2 corresponds to
checking the checkbox "Use this connection only for resources on its own
network" in NetworkManager settings (good for corporate VPNs). I guess
you want to match Example 2, because you mention you're having trouble
resolving internal names, so I guess it's a corporate VPN.

What I don't understand is how you wound up in such a weird state. If
/etc/resolv.conf points to /var/run/NetworkManager/resolv.conf, then
NetworkManager doesn't realize systemd-resolved is running at all, and
won't attempt to use split DNS, so this trouble is expected. But if
/etc/resolv.conf points to the stub resolver, NetworkManager should
configure systemd-resolved to match one of my two examples, yet that has
not happened in your case. I don't know why.

> If I use /var/run/NetworkManager/resolv.conf, resolvectl dns says this:
> 
> Global: <VPN nameservers> <default nameservers>
> Link 2 (wlp58s0): <default nameservers>
> Link 3 (virbr0):
> Link 4 (virbr0-nic):
> Link 5 (tun0):

This isn't good. Ideally your VPN servers would be listed under Link 5 (tun0) 
rather than Global. Forget about this case: let's not bother with 
/var/run/NetworkManager/resolv.conf.
 
> However, if i use the stub resolver, the VPN nameservers do not show up at
> all:
> 
> Global:
> Link 2 (wlp58s0): <default nameservers>
> Link 3 (virbr0):
> Link 4 (virbr0-nic):
> Link 6 (tun0):

This is a little better, in that your VPN nameservers are no longer
listed in the wrong place. But they're not listed in the right place
either. That is strange.

You can try to manually fix it. Let's say you want DNS for your internal
corporate domain, example.com, to be resolved over VPN, and everything
else to be resolved by your ISP, then you could try (untested):

$ sudo nmcli connection modify tun0 ipv4.dns-search ~example.com
ipv4.dns 1.2.3.4

Of course, replace example.com with your internal domain, and 1.2.3.4
with the desired internal DNS server. But while manually fixing it is
fine, I wish I knew how it got so messed up in the first place! Because
so long as /etc/resolv.conf is symlinked to systemd-resolved,
NetworkManager should take care of all this for you.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/14

------------------------------------------------------------------------
On 2020-10-30T10:08:20+00:00 thaller wrote:

> I suspect this is a NetworkManager packaging bug. I suspect the
NetworkManager package previously symlinked /etc/resolv.conf to
/var/run/NetworkManager/resolv.conf.

Maybe NetworkManager did that. But it only did that a (relatively) long
time ago, and stopped doing that since. In that case, fix it by creating
/etc/resolv.conf to be a file or (a different) symlink as desired.

Nowadays (including Fedora 32), NetworkManager never writes
/etc/resolv.conf as a symlink. /etc/resolv.conf being a symlink is taken
as a hint/configuration by the administrator who is in charge of
resolv.conf. With `rc-manager=symlink` setting (the default, see `man
NetworkManager.conf`) it would do nothing if it finds a symlink and
otherwise write /etc/resolv.conf as a regular file.


> We probably need a scriptlet somewhere to clean this up, probably in the 
> NetworkManager package, or perhaps in the systemd package. So while I do 
> think we have a Fedora bug here, that also doesn't explain what's going wrong 
> for you.

Regardless whether NetworkManager did it or the user, symlinking
/etc/resolv.conf to /var/run/NetworkManager/resolv.conf is a possible,
sensible configuration on its own (of course not in combination with
using systemd-resolved). I think the upgrade to Fedora 33 should only
enable systemd-resolved if /etc/resolv.conf is a regular file. And -- as
already gets checked -- that it has the "generated by NetworkManager`
line.

Alternatively, upgrade could also migrate such systems to systemd-
resolved and reset the /etc/resolv.conf symlink. But that might not be
what the user wants....


I find this bug report rather confusing. There are countless ways how to
configure DNS (some working/sensible, some not). But what matters it the
initial configuration, directly after upgrade -- and to find out what
went wrong, why is it no longer working.

Sure, we should find out how to best fix the misconfiguration, but let's
focus on first understanding what the original report and the actual
misconfiguration is (and how it happened).

Note that even if the upgrade went as desired, enabling systemd-resolved
means to switch from plain /etc/resolv.conf to enable split DNS. That
*is* an intentional change in behavior, and you can have a DNS
configuration (in NetworkManager) that happened to work previously, but
stops after switching to split DNS. Of course, in most cases both should
work similar enough.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/15

------------------------------------------------------------------------
On 2020-10-30T15:24:54+00:00 mcatanza wrote:

(In reply to Thomas Haller from comment #11)
> Regardless whether NetworkManager did it or the user, symlinking
> /etc/resolv.conf to /var/run/NetworkManager/resolv.conf is a possible,
> sensible configuration on its own (of course not in combination with using
> systemd-resolved). I think the upgrade to Fedora 33 should only enable
> systemd-resolved if /etc/resolv.conf is a regular file. And -- as already
> gets checked -- that it has the "generated by NetworkManager` line.

Hm, we do not touch /etc/resolv.conf during upgrade if it is already a
symlink, but we do enable systemd-resolved regardless. So I think that
explains how users wound up in this scenario. They presumably upgraded
from very old Fedora. Assuming they didn't manually configure this, it's
Fedora's job to handle that. So I still think that's a Fedora bug. We
ought to either (a) assume that anyone using
/var/run/NetworkManager/resolv.conf is doing so due to our mistake, and
migrate them to stub-resolv.conf, or (b) not enable systemd-resolved in
this scenario.

Anyway, that doesn't fully explain the weird DNS configurations we're
seeing.

> I find this bug report rather confusing. There are countless ways how
to configure DNS (some working/sensible, some not). But what matters it
the initial configuration, directly after upgrade -- and to find out
what went wrong, why is it no longer working.

Well, yes, that's the problem. Clearly something else has gone wrong
somewhere for both these users, but to have an actionable bug report, we
need to know exactly what. These configurations are weird, and I don't
see how they could have happened. Without knowing how it happened, we
don't have much to go on, and certainly no evidence of another bug, and
also no evidence that it is the same problem for both users.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/16

------------------------------------------------------------------------
On 2020-10-30T15:46:12+00:00 benedikt wrote:

If I configure /etc/resolv.conf to be symlinked to
../run/systemd/resolve/stub-resolv.conf, the bug remains nearly the
same. The original report changes insofar as new nameservers don't get
added to /etc/resolv.conf, however, the do not show up in the output of
"resolvectl dns" either, and the search domain for the root zone remains
with the physical network interface rather than being switched to the
tunnel interface. Unless there is a different bit of hidden
configuration, it seems that even fresh installations of F33 would
encounter the problem of non-resolving internal names.

I can configure DNS servers and search domain manually via nmcli; upon
connection these are then added to the tunnel interface and resolving
internal names works.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/17

------------------------------------------------------------------------
On 2020-10-30T16:28:10+00:00 mcatanza wrote:

(In reply to Benedikt Gollatz from comment #13)
> Unless there is a different bit of hidden configuration, it seems
> that even fresh installations of F33 would encounter the problem of
> non-resolving internal names.

Well I doubt it, because if so, openvpn would be broken for everyone.
You should get one of the following behaviors for 'resolvectl domain'.
With "use this connection only for resources on its network" unchecked
(default behavior, good for public VPNs):

Global:
Link 2 (wlp58s0):
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (tun0): ~.

Or, with "use this connection only for resources on its network" checked
(good for corporate VPNs):

Global:
Link 2 (wlp58s0): ~.
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 5 (tun0): example.com

where example.com is the domain of your VPN. Since you are trying to
resolve internal names, I assume you're using a corporate VPN and that
is the setup you want? Can you please confirm that you have that button
checked?

In both cases, 'resolvectl dns' should look like this:

Global:
Link 2 (wlp58s0): <default nameservers>
Link 3 (virbr0):
Link 4 (virbr0-nic):
Link 6 (tun0): <VPN nameservers>

That's all rehashed from comment #10, but I post it again here for
clarity. I use both configurations every day, at the same time, and it
all works as expected for me. Deviation from the above is unexpected and
unusual. Something strange is happening with your case, and we need to
figure out why.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/18

------------------------------------------------------------------------
On 2020-11-08T20:28:51+00:00 dev wrote:

After upgrade to F33 I also have a problem with DNS and VPN (openvpn).

My normal use case is a connection with activated "use this connection
only for resources on its network" not working anymore:

resolvectl dns
Global:
Link 2 (enp0s31f6):
Link 3 (wlp3s0): <home_router_ipv4> <home_router_ipv6>
Link 4 (virbr1):
Link 5 (virbr1-nic):
Link 6 (virbr0):
Link 7 (virbr0-nic):
Link 12 (tun0):

resolvectl domain
Global:
Link 2 (enp0s31f6):
Link 3 (wlp3s0): ~. fritz.box
Link 4 (virbr1):
Link 5 (virbr1-nic):
Link 6 (virbr0):
Link 7 (virbr0-nic):
Link 12 (tun0):


If I uncheck this option and reconnect, all works as expected:

resolvectl dns
Global:
Link 2 (enp0s31f6):
Link 3 (wlp3s0): <home_router_ipv4>
Link 4 (virbr1):
Link 5 (virbr1-nic):
Link 6 (virbr0):
Link 7 (virbr0-nic):
Link 13 (tun0): <VPN nameservers>

resolvectl domain
Global:
Link 2 (enp0s31f6):
Link 3 (wlp3s0): fritz.box
Link 4 (virbr1):
Link 5 (virbr1-nic):
Link 6 (virbr0):
Link 7 (virbr0-nic):
Link 13 (tun0): ~.


My '/etc/resolv.conf' is a symlink to '../run/systemd/resolve/stub-resolv.conf'

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/19

------------------------------------------------------------------------
On 2020-11-08T22:10:58+00:00 mcatanza wrote:

(In reply to Illya from comment #15)
> After upgrade to F33 I also have a problem with DNS and VPN (openvpn).
> 
> My normal use case is a connection with activated "use this connection only
> for resources on its network" not working anymore:
> 
> resolvectl dns
> Global:
> Link 2 (enp0s31f6):
> Link 3 (wlp3s0): <home_router_ipv4> <home_router_ipv6>
> Link 4 (virbr1):
> Link 5 (virbr1-nic):
> Link 6 (virbr0):
> Link 7 (virbr0-nic):
> Link 12 (tun0):

Yeah, that looks like the same issue. I wonder why NetworkManager is not
configuring a DNS domain for tun0.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/20

------------------------------------------------------------------------
On 2020-11-09T18:17:18+00:00 dev wrote:

(In reply to Michael Catanzaro from comment #16)
> (In reply to Illya from comment #15)
> > After upgrade to F33 I also have a problem with DNS and VPN (openvpn).
> > 
> > My normal use case is a connection with activated "use this connection only
> > for resources on its network" not working anymore:
> > 
> > resolvectl dns
> > Global:
> > Link 2 (enp0s31f6):
> > Link 3 (wlp3s0): <home_router_ipv4> <home_router_ipv6>
> > Link 4 (virbr1):
> > Link 5 (virbr1-nic):
> > Link 6 (virbr0):
> > Link 7 (virbr0-nic):
> > Link 12 (tun0):
> 
> Yeah, that looks like the same issue. I wonder why NetworkManager is not
> configuring a DNS domain for tun0.


The issue is resolved for me. 
Our server was not pushing domain options. Change on server side was to add 
following lines to the '/etc/openvpn/server/server.conf':

push "dhcp-option DOMAIN some-domain.net"
push "dhcp-option DOMAIN some-other-domain.com"

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/21

------------------------------------------------------------------------
On 2020-11-09T18:32:48+00:00 mcatanza wrote:

Thanks for sharing solution.

I still think it's a NetworkManager bug though, because NetworkManager
knows that "use this connection only for resources on its network"
without any DNS domains is a nonsensical configuration, and clearly more
users are hitting the same problem and won't be able to fix their VPN
servers. NetworkManager should set a DNS domain automatically when none
are set.

This is actually quite similar to bug #1863041, and probably not
specific to the openvpn plugin.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/22

------------------------------------------------------------------------
On 2020-11-09T18:35:47+00:00 mcatanza wrote:

BTW to be clear, my proposed expected behavior would be to set the top
privately-controlled domain of the VPN's gateway address as a DNS search
domain if "use this connection only for resources on its network" is
checked and the server does not specify and search domains. Then if
you're connecting to an example.com VPN, you'll at least be able to
resolve example.com addresses (although resolving non-example.com
internal domains will fail).

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/23

------------------------------------------------------------------------
On 2020-11-09T19:12:51+00:00 dev wrote:

Or the previous behaviour could be restored:
- all DNS traffic goes to VPN DNS if no domains were pushed 
- other traffic is routed according to pushed routes

Eventually with the second checkbox "Use this connection's DNS only for
resources on its network"

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/24

------------------------------------------------------------------------
On 2020-11-09T19:25:22+00:00 jan.public wrote:


> Why is there no tun interface?

Maybe because I'm using strongswan, not openvpn?

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/25

------------------------------------------------------------------------
On 2020-11-11T08:05:37+00:00 jan.public wrote:

Maybe this Ubuntu bug is related:
https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/26

------------------------------------------------------------------------
On 2020-11-11T14:53:58+00:00 mcatanza wrote:

That might be your problem, but it is definitely not *this* bug, because
Benedikt is not using a strongswan VPN. I think we've reached the point
where you really need your own separate bug report for your issue.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/27

------------------------------------------------------------------------
On 2020-12-01T09:06:04+00:00 jan.public wrote:

(In reply to Michael Catanzaro from comment #23)
> That might be your problem, but it is definitely not *this* bug, because
> Benedikt is not using a strongswan VPN. I think we've reached the point
> where you really need your own separate bug report for your issue.

For information, the root cause of the problem with strongswan is
described here: https://wiki.strongswan.org/issues/3615.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/29

------------------------------------------------------------------------
On 2021-11-04T16:53:06+00:00 bcotton wrote:

This message is a reminder that Fedora 33 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora 33 on 2021-11-30.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with 
a
Fedora 'version' of '33'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 33 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Reply at: https://bugs.launchpad.net/ubuntu/+source/network-manager-
strongswan/+bug/1864256/comments/33

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864256

Title:
  Network-manager-strongswan does not update DNS in systemd-resolved

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager-strongswan/+bug/1864256/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to