User Details
- User Since
- Mar 23 2021, 6:54 AM (211 w, 23 h)
May 9 2022
It may be a good idea to cherry-pick this for 1.4.x branch.
May 5 2022
I've creatred a pull request for the above - https://github.com/vyos/vyos-1x/pull/1313
May 4 2022
May 3 2022
Also, these routes getting an administrative distance of 1, which is impossible to override. I believe the default route from DHCP normally has 210 which is manageable. So, the quick workaround could be increasing distance of these routes.
r24:/home/dtoubelis# cat /var/lib/dhcp/dhclient_eth4.leases lease { interface "eth4"; fixed-address 100.123.57.53; option subnet-mask 255.192.0.0; option relay-agent-information 1:4:0:0:4:cf:5:4:64:40:0:1:97:8:1:0:14:ed:0:0:14:ed:98:0; option dhcp-lease-time 300; option routers 100.64.0.1; option dhcp-message-type 5; option domain-name-servers 1.1.1.1,8.8.8.8; option dhcp-server-identifier 100.64.0.1; option interface-mtu 1500; option rfc3442-classless-static-routes 32,192,168,100,1,0,0,0,0,32,34,120,255,244,0,0,0,0,0,100,64,0,1; renew 2 2022/05/03 12:42:00; rebind 2 2022/05/03 12:44:26; expire 2 2022/05/03 12:45:04; } lease { interface "eth4"; fixed-address 100.123.57.53; option subnet-mask 255.192.0.0; option relay-agent-information 1:4:0:0:4:cf:5:4:64:40:0:1:97:8:1:0:14:ed:0:0:14:ed:98:0; option dhcp-lease-time 300; option routers 100.64.0.1; option dhcp-message-type 5; option domain-name-servers 1.1.1.1,8.8.8.8; option dhcp-server-identifier 100.64.0.1; option interface-mtu 1500; option rfc3442-classless-static-routes 32,192,168,100,1,0,0,0,0,32,34,120,255,244,0,0,0,0,0,100,64,0,1; renew 2 2022/05/03 12:46:34; rebind 2 2022/05/03 12:48:50; expire 2 2022/05/03 12:49:28; } lease { interface "eth4"; fixed-address 100.123.57.53; option subnet-mask 255.192.0.0; option relay-agent-information 1:4:0:0:4:cf:5:4:64:40:0:1:97:8:1:0:14:ed:0:0:14:ed:98:0; option dhcp-lease-time 300; option routers 100.64.0.1; option dhcp-message-type 5; option domain-name-servers 1.1.1.1,8.8.8.8; option dhcp-server-identifier 100.64.0.1; option interface-mtu 1500; option rfc3442-classless-static-routes 32,192,168,100,1,0,0,0,0,32,34,120,255,244,0,0,0,0,0,100,64,0,1; renew 2 2022/05/03 12:51:33; rebind 2 2022/05/03 12:53:25; expire 2 2022/05/03 12:54:03; } ... }
Below is a packet capture from DHCP exchange:
It seems that option 121 has more than one route. Could this be causing the abnormal behavior?
Aug 18 2021
Sounds good to me.
Aug 17 2021
Any news on this?
I haven't tested it directly but I haven't experienced this problem while working on the configuration changes. I don't have much time right now, so I can't test the exact scenario.
Jul 9 2021
The issue seems still present in Vyos 1.3.0-rc5
May 26 2021
Where can I get the rc4? The last RR I see is vyos-1.3-rolling-202105011026-amd64.iso.
BTW, the same happens when adding/removing interfaces to an area.
I did some more digging and found a reliable way of reproducing it:
May 17 2021
I think I found a way to reproduce it:
- rename an interface that was previously included in ospfv3 configuration and then remove it in the same commit from ospfv3 in the same commit.
- get an error that interface is not found. I think that at this stage the configuration is applied only partially
- after that error configuration in frr and vyos goes out of sync and never unsynchronized unless forced (or by lucky accident :-)
Hmm, I still have it in my running-config. Is there a way to force config regeneration?
The "Time exceeded" likely means that message is sent to a black hole. There are two bfd sessions running through the same tunnel - one for OSPF and the other for OSPFv3. Timeout settings are the same and the first one is established instantly and is running happily. The OSPFv3 one is not so much:
BFDd amybe creating those addresses automatically. In theory, it doesn't matter what they are as long as both ends have a way of learning them. I'm not sure if this is a general issue or an issue only with wireguard but right now bfd doesn't work with OSPFv3 over wireguard.
BTW, it appears ths fe80::... addresses used in bfd dialogue do not belong to any of the actual interfaces. It could be by design but this si something I discovered when trying to troubleshoot the session. This could also be the reason for mismatch between session ends if the other side does not know the peer address.
Attaching packet captures from both ends filered with bfd && ipv6.addr == fe80::/64 rule
I ran a packet capture on the session and It appears had been an issue with firewall settings on the provider site. It just happened that we hit a similar issue with two providers and VyOS was the common denominator but It appears to be red herring. Feel free to close.
May 12 2021
the same is the case for GRE interfaces too (ip6gre in particular)
May 11 2021
I ran a packet capture on this BGP session and it appears that VyOS actually sends some packets out and they appear to go through the right gateway... I'm investigating with the provider and will post an update here shortly.
May 10 2021
Yes, I've changed the source since i posted the configuration and now it is the specific IP address that the peer expects.
This issue is consistently reproducible and I'm experiencing it with two peers. I convinced one of them to disable passive mode on their end but the other one is not that flexible.
r6:~$ show ip route 172.107.195.1 Routing entry for 172.107.195.1/32 Known via "static", distance 1, metric 0, best Last update 00:32:33 ago * 38.39.193.57, via eth0, weight 1
I've also tried with disable-connected-check option with no effect
This is the current setup:
The route is set and validated with traceroute and it has 2 hops.
May 2 2021
The 2001:19f0:ffff::1 is the neighbour, it is accessible via the Kernel route and I'm able to pull routes from it. The setup is multihop. But I think you are on something. I think the peer should return the gateway as the next hop and not itself. I'm experimenting with Vultr and their setup is questionable, so this is just one more thing that they messed up. Anyhow, thanks for your help. Feel free to close the ticket.
May 1 2021
Hmm, all other routes have longer prefixes, so they should take precedence. As far as I understand the priority is prefix length (longest first) -> admin distance -> metric. So, your explanation contradicts this unless I miss something.
Apr 12 2021
Sorry for the late reply, I've dismantled the setup as I needed to put the PPP link back in use, I will look into it again tonight. In essence, it would be good to see something like this on terse view:
Apr 2 2021
I think the presence of the kernel default route may be the problem. It comes from RA through autoconf option on the interface. I will do some more testing.
Mar 30 2021
I still see it in frr after the reboot but it is not showing in the output of show ipv6 route, so it seems like just a visualization problem.
What command do you use to get this?
Mar 29 2021
Mar 25 2021
I will give it a try once the image is out. The latest right now is still showing 2021-03-23.
Mar 24 2021
Mar 23 2021
Yes, I made mistake when adding the command to the ticket and I corrected it now. It should read: