[Bug 227086] Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Thu Mar 29 19:28:19 UTC 2018
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=227086
Bug ID: 227086
Summary: Upgraded world - broken OpenVPN second tun - ifconfig:
ioctl (SIOCAIFADDR): File exists
Product: Base System
Version: 11.1-STABLE
Hardware: amd64
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: misc
Assignee: freebsd-bugs at FreeBSD.org
Reporter: zillion1 at o2.pl
Hello,
Long time I didn't upgrade my FreeBSD 11-STABLE world, so I did it today.
Unfortunately my working OpenVPN configuration failed to start correctly.
My config is: server and client on the same host.
Server starts just fine, the tun0 device gets up, but client doesn't configure
tun1 device.
Log says:
Thu Mar 29 16:09:53 2018 OpenVPN 2.4.5 amd64-portbld-freebsd11.1 [SSL
(OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Mar 16 2018
Thu Mar 29 16:09:53 2018 library versions: OpenSSL 1.0.2o-freebsd 27 Mar 2018,
LZO 2.10
Thu Mar 29 16:09:53 2018 Outgoing Control Channel Encryption: Cipher
'AES-256-CTR' initialized with 256 bit key
Thu Mar 29 16:09:53 2018 Outgoing Control Channel Encryption: Using 256 bit
message hash 'SHA256' for HMAC authentication
Thu Mar 29 16:09:53 2018 Incoming Control Channel Encryption: Cipher
'AES-256-CTR' initialized with 256 bit key
Thu Mar 29 16:09:53 2018 Incoming Control Channel Encryption: Using 256 bit
message hash 'SHA256' for HMAC authentication
Thu Mar 29 16:09:53 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]192.168.0.1:1194
Thu Mar 29 16:09:53 2018 Socket Buffers: R=[41600->41600] S=[9216->9216]
Thu Mar 29 16:09:53 2018 UDP link local: (not bound)
Thu Mar 29 16:09:53 2018 UDP link remote: [AF_INET]192.168.0.1:1194
Thu Mar 29 16:09:53 2018 TLS: Initial packet from [AF_INET]192.168.0.1:1194,
sid=9a9d27d1 1a2ad740
Thu Mar 29 16:09:53 2018 VERIFY OK: depth=1, C=PL, ST=xxx, L=aaa, O=OpenVPN
Server, OU=OpenVPN, CN=OpenVPN Server CA, name=bbb, emailAddress=abc at xyz.pl
Thu Mar 29 16:09:53 2018 VERIFY KU OK
Thu Mar 29 16:09:53 2018 Validating certificate extended key usage
Thu Mar 29 16:09:53 2018 ++ Certificate has EKU (str) TLS Web Server
Authentication, expects TLS Web Server Authentication
Thu Mar 29 16:09:53 2018 VERIFY EKU OK
Thu Mar 29 16:09:53 2018 VERIFY OK: depth=0, C=PL, ST=xxx, L=aaa, O=OpenVPN
Server, OU=OpenVPN, CN=OpenVPN Server CA, name=bbb, emailAddress=abc at xyz.pl
Thu Mar 29 16:09:53 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3
ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Mar 29 16:09:53 2018 [server] Peer Connection Initiated with
[AF_INET]192.168.0.1:1194
Thu Mar 29 16:09:54 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Mar 29 16:09:54 2018 PUSH: Received control message:
'PUSH_REPLY,route-gateway 10.20.20.1,topology subnet,ping 5,ping-restart
10,ifconfig 10.20.20.10 255.255.255.0,peer-id 11,cipher AES-256-GCM'
Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: timers and/or timeouts modified
Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: --ifconfig/up options modified
Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: route-related options modified
Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: peer-id set
Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: adjusting link_mtu to 1625
Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: data channel crypto options modified
Thu Mar 29 16:09:54 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Mar 29 16:09:54 2018 Outgoing Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
Thu Mar 29 16:09:54 2018 Incoming Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
Thu Mar 29 16:09:54 2018 TUN/TAP device /dev/tun1 opened
Thu Mar 29 16:09:54 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Mar 29 16:09:54 2018 /sbin/ifconfig tun1 10.20.20.10 10.0.20.1 mtu 1500
netmask 255.255.255.0 up
ifconfig: ioctl (SIOCAIFADDR): File exists
Thu Mar 29 16:09:54 2018 FreeBSD ifconfig failed: external program exited with
error status: 1
Thu Mar 29 16:09:54 2018 Exiting due to fatal error
I reverted whole system from backup, where's no problem with client (here is
after client restart log):
Thu Mar 29 21:16:14 2018 OpenVPN 2.4.5 amd64-portbld-freebsd11.1 [SSL
(OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Mar 16 2018
Thu Mar 29 21:16:14 2018 library versions: OpenSSL 1.0.2k-freebsd 26 Jan 2017,
LZO 2.10
Thu Mar 29 21:16:14 2018 Outgoing Control Channel Encryption: Cipher
'AES-256-CTR' initialized with 256 bit key
Thu Mar 29 21:16:14 2018 Outgoing Control Channel Encryption: Using 256 bit
message hash 'SHA256' for HMAC authentication
Thu Mar 29 21:16:14 2018 Incoming Control Channel Encryption: Cipher
'AES-256-CTR' initialized with 256 bit key
Thu Mar 29 21:16:14 2018 Incoming Control Channel Encryption: Using 256 bit
message hash 'SHA256' for HMAC authentication
Thu Mar 29 21:16:14 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]192.168.0.1:1194
Thu Mar 29 21:16:14 2018 Socket Buffers: R=[41600->41600] S=[9216->9216]
Thu Mar 29 21:16:14 2018 UDP link local: (not bound)
Thu Mar 29 21:16:14 2018 UDP link remote: [AF_INET]192.168.0.1:1194
Thu Mar 29 21:16:14 2018 TLS: Initial packet from [AF_INET]192.168.0.1:1194,
sid=fe0a85cd 957bd051
Thu Mar 29 21:16:14 2018 VERIFY OK: depth=1, C=PL, ST=xxx, L=aaa, O=OpenVPN
Server, OU=OpenVPN, CN=OpenVPN Server CA, name=bbb, emailAddress=abc at xyz.pl
Thu Mar 29 21:16:14 2018 VERIFY KU OK
Thu Mar 29 21:16:14 2018 Validating certificate extended key usage
Thu Mar 29 21:16:14 2018 ++ Certificate has EKU (str) TLS Web Server
Authentication, expects TLS Web Server Authentication
Thu Mar 29 21:16:14 2018 VERIFY EKU OK
Thu Mar 29 21:16:14 2018 VERIFY OK: depth=0, C=PL, ST=xxx, L=aaa, O=OpenVPN
Server, OU=OpenVPN, CN=OpenVPN Server CA, name=bbb, emailAddress=abc at xyz.pl
Thu Mar 29 21:16:14 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3
ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Mar 29 21:16:14 2018 [server] Peer Connection Initiated with
[AF_INET]192.168.0.1:1194
Thu Mar 29 21:16:16 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Mar 29 21:16:16 2018 PUSH: Received control message:
'PUSH_REPLY,route-gateway 10.20.20.1,topology subnet,ping 5,ping-restart
10,ifconfig 10.20.20.10 255.255.255.0,peer-id 17,cipher AES-256-GCM'
Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: timers and/or timeouts modified
Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: --ifconfig/up options modified
Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: route-related options modified
Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: peer-id set
Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: adjusting link_mtu to 1625
Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: data channel crypto options modified
Thu Mar 29 21:16:16 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Mar 29 21:16:16 2018 Outgoing Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
Thu Mar 29 21:16:16 2018 Incoming Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
Thu Mar 29 21:16:16 2018 TUN/TAP device /dev/tun1 opened
Thu Mar 29 21:16:16 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Mar 29 21:16:16 2018 /sbin/ifconfig tun1 10.20.20.10 10.20.20.1 mtu 1500
netmask 255.255.255.0 up
Thu Mar 29 21:16:16 2018 /sbin/route add -net 10.20.20.0 10.20.20.1
255.255.255.0
add net 10.20.20.0: gateway 10.20.20.1 fib 0: route already in table
Thu Mar 29 21:16:16 2018 ERROR: FreeBSD route add command failed: external
program exited with error status: 1
Thu Mar 29 21:16:16 2018 Initialization Sequence Completed
Working revision: 11.1-STABLE r323310 - both tun devices are bringing up, so
server and client works flawesly, r331740 failed.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-bugs
mailing list