No, unfortunately didn't find why this happens. Currently I don't have too much time to look at it, but I'll update if I figure it out.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts Menu
# cat /usr/local/etc/wireguard/wg0.conf
[Interface]
PrivateKey = *
Address = 10.x.11.1/24
ListenPort = 51820
[Peer]
PublicKey = *
AllowedIPs = 10.x.11.2/32
PersistentKeepalive = 25
# cat /usr/local/etc/wireguard/wg1.conf
[Interface]
PrivateKey = *
Address = 10.x.12.1/24
ListenPort = 51821
[Peer]
PublicKey = *
AllowedIPs = 10.x.12.2/32
# opnsense-version
OPNsense 21.1.5 (amd64/OpenSSL)
LAN (igb1) -> v4: 10.x.x.x/22
LTE (igb2) -> v4/DHCP4: 100.81.238.96/8
VLAN99 (igb1_vlan99) -> v4: 10.x.x.x/24
WAN (igb0) -> v4/DHCP4: [redacted public wan addr]/22
---
Info from GUI admin panel:
Firewall: Rules: LAN
pass in quick IPv4 TCP LAN net * * 80 (HTTP) WANGRP_BAL * balancer port 80 (testing with one port)
System: Gateways: Group
WANGRP_BAL Tier 1 WAN_DHCP, Online LTE_DHCP, Online
---
### FAILED CONNECTION ATTEMPT ###
host1$ curl -vv --no-keepalive ipinfo.io/ip
* Trying 34.117.59.81...
* TCP_NODELAY set
^C
pflog port 80:
00:01:24.454627 rule 89/0(match): pass out on igb2: 100.81.238.96.32462 > 34.117.59.81.80: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383378181 ecr 0,sackOK,eol], length 0
00:00:00.000033 rule 12/0(match): block in on igb1: 100.81.238.96.32462 > 34.117.59.81.80: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383378181 ecr 0,sackOK,eol], length 0
00:00:01.004095 rule 12/0(match): block in on igb1: 100.81.238.96.32462 > 34.117.59.81.80: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383379181 ecr 0,sackOK,eol], length 0
00:00:01.001265 rule 12/0(match): block in on igb1: 100.81.238.96.32462 > 34.117.59.81.80: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383380181 ecr 0,sackOK,eol], length 0
00:00:01.006849 rule 12/0(match): block in on igb1: 100.81.238.96.32462 > 34.117.59.81.80: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383381182 ecr 0,sackOK,eol], length 0
00:00:01.009931 rule 12/0(match): block in on igb1: 100.81.238.96.32462 > 34.117.59.81.80: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383382183 ecr 0,sackOK,eol], length 0
# pfctl -vvsr
[related rule excerpts shown]
@12 block drop in log inet all label "02f4bab031b57d1e30553ce08e0ec131"
@89 pass out log route-to (igb2 100.0.0.1) inet from (igb2:1) to ! (igb2:network:1) flags S/SA keep state allow-opts label "2353a7ed14c76ff61dfcda4957a92650"
@90 pass out log route-to (igb0 [redacted wan gw addr]) inet from (igb0:1) to ! (igb0:network:1) flags S/SA keep state allow-opts label "ef794793b2e3764b938bd04cba88e8a3"
@97 pass in quick on igb1 route-to { (igb0 [redacted wan gw addr]), (igb2 100.0.0.1) } round-robin sticky-address inet proto tcp from (igb1:network:1) to any port = http flags S/SA keep state label "d99770ba92021f7399ca68212d1a6837"
igb1 (LAN):
18:27:38.914248 IP host1.local.lan.58623 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383378181 ecr 0,sackOK,eol], length 0
18:27:39.918344 IP host1.local.lan.58623 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383379181 ecr 0,sackOK,eol], length 0
18:27:40.919651 IP host1.local.lan.58623 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383380181 ecr 0,sackOK,eol], length 0
18:27:41.926466 IP host1.local.lan.58623 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383381182 ecr 0,sackOK,eol], length 0
18:27:42.936431 IP host1.local.lan.58623 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383382183 ecr 0,sackOK,eol], length 0
18:27:43.932328 IP host1.local.lan.58623 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 3455205181, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383383183 ecr 0,sackOK,eol], length 0
igb0/2:
(no activity)
other failed attempts from pflog -- similar as above: pass out igb0/2 (WAN/LTE), block on igb1 (LAN)
00:00:00.028418 rule 90/0(match): pass out on igb0: [redacted public wan addr].53498 > 34.117.59.81.80: Flags [S], seq 3696100957, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382040912 ecr 0,sackOK,eol], length 0
00:00:00.000054 rule 12/0(match): block in on igb1: [redacted public wan addr].53498 > 34.117.59.81.80: Flags [S], seq 3696100957, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382040912 ecr 0,sackOK,eol], length 0
00:00:00.036057 rule 12/0(match): block in on igb1: [redacted public wan addr].53498 > 34.117.59.81.80: Flags [S], seq 3696100957, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382041912 ecr 0,sackOK,eol], length 0
00:00:04.591393 rule 90/0(match): pass out on igb0: [redacted public wan addr].34197 > 34.117.59.81.80: Flags [S], seq 1510025405, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382022288 ecr 0,sackOK,eol], length 0
00:00:00.000105 rule 12/0(match): block in on igb1: [redacted public wan addr].34197 > 34.117.59.81.80: Flags [S], seq 1510025405, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382022288 ecr 0,sackOK,eol], length 0
00:00:01.001680 rule 12/0(match): block in on igb1: [redacted public wan addr].34197 > 34.117.59.81.80: Flags [S], seq 1510025405, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382023288 ecr 0,sackOK,eol], length 0
00:00:01.003425 rule 12/0(match): block in on igb1: [redacted public wan addr].34197 > 34.117.59.81.80: Flags [S], seq 1510025405, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382024288 ecr 0,sackOK,eol], length 0
00:00:08.655713 rule 89/0(match): pass out on igb2: 100.81.238.96.61894 > 34.117.59.81.80: Flags [S], seq 2664141400, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383290399 ecr 0,sackOK,eol], length 0
00:00:00.000035 rule 12/0(match): block in on igb1: 100.81.238.96.61894 > 34.117.59.81.80: Flags [S], seq 2664141400, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383290399 ecr 0,sackOK,eol], length 0
00:00:01.245658 rule 12/0(match): block in on igb1: 100.81.238.96.61894 > 34.117.59.81.80: Flags [S], seq 2664141400, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383291399 ecr 0,sackOK,eol], length 0
00:00:01.236256 rule 12/0(match): block in on igb1: 100.81.238.96.61894 > 34.117.59.81.80: Flags [S], seq 2664141400, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383292399 ecr 0,sackOK,eol], length 0
00:00:02.496906 rule 89/0(match): pass out on igb2: 100.81.238.96.49976 > 34.117.59.81.80: Flags [S], seq 627667560, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383280462 ecr 0,sackOK,eol], length 0
00:00:00.000033 rule 12/0(match): block in on igb1: 100.81.238.96.49976 > 34.117.59.81.80: Flags [S], seq 627667560, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383280462 ecr 0,sackOK,eol], length 0
00:00:01.304970 rule 12/0(match): block in on igb1: 100.81.238.96.49976 > 34.117.59.81.80: Flags [S], seq 627667560, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383281462 ecr 0,sackOK,eol], length 0
00:00:01.096841 rule 12/0(match): block in on igb1: 100.81.238.96.49976 > 34.117.59.81.80: Flags [S], seq 627667560, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1383282462 ecr 0,sackOK,eol], length 0
### SUCCESSFUL CONNECTION (over igb2/LTE) ###
LAN$ curl -vv --no-keepalive ipinfo.io/ip
(returns normal output with the correct IP address)
pflog port 80:
00:00:13.700721 rule 89/0(match): pass out on igb2: 100.81.238.96.40943 > 34.117.59.81.80: Flags [S], seq 481893042, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382326151 ecr 0,sackOK,eol], length 0
tcpdump on igb2 (LTE):
18:09:56.012328 IP 100.81.238.96.40943 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 481893042, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382326151 ecr 0,sackOK,eol], length 0
18:09:56.166590 IP 81.59.117.34.bc.googleusercontent.com.http > 100.81.238.96.40943: Flags [S.], seq 3838886839, ack 481893043, win 65535, options [mss 1400,sackOK,TS val 3177229224 ecr 1382326151,nop,wscale 8], length 0
18:09:56.169993 IP 100.81.238.96.40943 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 1, win 2060, options [nop,nop,TS val 1382326312 ecr 3177229224], length 0
18:09:56.170077 IP 100.81.238.96.40943 > 81.59.117.34.bc.googleusercontent.com.http: Flags [P.], seq 1:76, ack 1, win 2060, options [nop,nop,TS val 1382326312 ecr 3177229224], length 75: HTTP: GET /ip HTTP/1.1
18:09:56.209452 IP 81.59.117.34.bc.googleusercontent.com.http > 100.81.238.96.40943: Flags [.], ack 76, win 256, options [nop,nop,TS val 3177229311 ecr 1382326312], length 0
18:09:56.329450 IP 81.59.117.34.bc.googleusercontent.com.http > 100.81.238.96.40943: Flags [P.], seq 1:213, ack 76, win 256, options [nop,nop,TS val 3177229431 ecr 1382326312], length 212: HTTP: HTTP/1.1 200 OK
18:09:56.332411 IP 100.81.238.96.40943 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 213, win 2057, options [nop,nop,TS val 1382326472 ecr 3177229431], length 0
18:09:56.332720 IP 100.81.238.96.40943 > 81.59.117.34.bc.googleusercontent.com.http: Flags [F.], seq 76, ack 213, win 2057, options [nop,nop,TS val 1382326472 ecr 3177229431], length 0
18:09:56.379562 IP 81.59.117.34.bc.googleusercontent.com.http > 100.81.238.96.40943: Flags [F.], seq 213, ack 77, win 256, options [nop,nop,TS val 3177229481 ecr 1382326472], length 0
18:09:56.382455 IP 100.81.238.96.40943 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 214, win 2057, options [nop,nop,TS val 1382326521 ecr 3177229481], length 0
tcpdump on igb1 (LAN):
18:09:56.011995 IP host1.local.lan.58463 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 481893042, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382326151 ecr 0,sackOK,eol], length 0
18:09:56.166830 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58463: Flags [S.], seq 3838886839, ack 481893043, win 65535, options [mss 1400,sackOK,TS val 3177229224 ecr 1382326151,nop,wscale 8], length 0
18:09:56.169801 IP host1.local.lan.58463 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 1, win 2060, options [nop,nop,TS val 1382326312 ecr 3177229224], length 0
18:09:56.170023 IP host1.local.lan.58463 > 81.59.117.34.bc.googleusercontent.com.http: Flags [P.], seq 1:76, ack 1, win 2060, options [nop,nop,TS val 1382326312 ecr 3177229224], length 75: HTTP: GET /ip HTTP/1.1
18:09:56.209628 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58463: Flags [.], ack 76, win 256, options [nop,nop,TS val 3177229311 ecr 1382326312], length 0
18:09:56.329601 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58463: Flags [P.], seq 1:213, ack 76, win 256, options [nop,nop,TS val 3177229431 ecr 1382326312], length 212: HTTP: HTTP/1.1 200 OK
18:09:56.332252 IP host1.local.lan.58463 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 213, win 2057, options [nop,nop,TS val 1382326472 ecr 3177229431], length 0
18:09:56.332677 IP host1.local.lan.58463 > 81.59.117.34.bc.googleusercontent.com.http: Flags [F.], seq 76, ack 213, win 2057, options [nop,nop,TS val 1382326472 ecr 3177229431], length 0
18:09:56.379707 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58463: Flags [F.], seq 213, ack 77, win 256, options [nop,nop,TS val 3177229481 ecr 1382326472], length 0
18:09:56.382258 IP host1.local.lan.58463 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 214, win 2057, options [nop,nop,TS val 1382326521 ecr 3177229481], length 0
### SUCCESSFUL CONNECTION (igb0/WAN) ###
curl similar as above
pflog port 80:
00:00:10.231422 rule 90/0(match): pass out on igb0: [redacted public wan addr].45505 > 34.117.59.81.80: Flags [S], seq 4264699357, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382488680 ecr 0,sackOK,eol], length 0
igb0 (WAN):
18:12:39.287238 IP [redacted resolved public wan addr].45505 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 4264699357, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382488680 ecr 0,sackOK,eol], length 0
18:12:39.297871 IP 81.59.117.34.bc.googleusercontent.com.http > [redacted resolved public wan addr].45505: Flags [S.], seq 318855234, ack 4264699358, win 65535, options [mss 1430,sackOK,TS val 3281088579 ecr 1382488680,nop,wscale 8], length 0
18:12:39.303371 IP [redacted resolved public wan addr].45505 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 1, win 2060, options [nop,nop,TS val 1382488701 ecr 3281088579], length 0
18:12:39.304366 IP [redacted resolved public wan addr].45505 > 81.59.117.34.bc.googleusercontent.com.http: Flags [P.], seq 1:76, ack 1, win 2060, options [nop,nop,TS val 1382488701 ecr 3281088579], length 75: HTTP: GET /ip HTTP/1.1
18:12:39.323159 IP 81.59.117.34.bc.googleusercontent.com.http > [redacted resolved public wan addr].45505: Flags [.], ack 76, win 256, options [nop,nop,TS val 3281088596 ecr 1382488701], length 0
18:12:39.438547 IP 81.59.117.34.bc.googleusercontent.com.http > [redacted resolved public wan addr].45505: Flags [P.], seq 1:213, ack 76, win 256, options [nop,nop,TS val 3281088716 ecr 1382488701], length 212: HTTP: HTTP/1.1 200 OK
18:12:39.442593 IP [redacted resolved public wan addr].45505 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 213, win 2057, options [nop,nop,TS val 1382488839 ecr 3281088716], length 0
18:12:39.442637 IP [redacted resolved public wan addr].45505 > 81.59.117.34.bc.googleusercontent.com.http: Flags [F.], seq 76, ack 213, win 2057, options [nop,nop,TS val 1382488839 ecr 3281088716], length 0
18:12:39.459904 IP 81.59.117.34.bc.googleusercontent.com.http > [redacted resolved public wan addr].45505: Flags [F.], seq 213, ack 77, win 256, options [nop,nop,TS val 3281088735 ecr 1382488839], length 0
18:12:39.463727 IP [redacted resolved public wan addr].45505 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 214, win 2057, options [nop,nop,TS val 1382488860 ecr 3281088735], length 0
igb1 (LAN):
18:12:39.287028 IP host1.local.lan.58484 > 81.59.117.34.bc.googleusercontent.com.http: Flags [S], seq 4264699357, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 1382488680 ecr 0,sackOK,eol], length 0
18:12:39.297921 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58484: Flags [S.], seq 318855234, ack 4264699358, win 65535, options [mss 1430,sackOK,TS val 3281088579 ecr 1382488680,nop,wscale 8], length 0
18:12:39.303273 IP host1.local.lan.58484 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 1, win 2060, options [nop,nop,TS val 1382488701 ecr 3281088579], length 0
18:12:39.304333 IP host1.local.lan.58484 > 81.59.117.34.bc.googleusercontent.com.http: Flags [P.], seq 1:76, ack 1, win 2060, options [nop,nop,TS val 1382488701 ecr 3281088579], length 75: HTTP: GET /ip HTTP/1.1
18:12:39.323238 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58484: Flags [.], ack 76, win 256, options [nop,nop,TS val 3281088596 ecr 1382488701], length 0
18:12:39.438594 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58484: Flags [P.], seq 1:213, ack 76, win 256, options [nop,nop,TS val 3281088716 ecr 1382488701], length 212: HTTP: HTTP/1.1 200 OK
18:12:39.442547 IP host1.local.lan.58484 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 213, win 2057, options [nop,nop,TS val 1382488839 ecr 3281088716], length 0
18:12:39.442603 IP host1.local.lan.58484 > 81.59.117.34.bc.googleusercontent.com.http: Flags [F.], seq 76, ack 213, win 2057, options [nop,nop,TS val 1382488839 ecr 3281088716], length 0
18:12:39.459943 IP 81.59.117.34.bc.googleusercontent.com.http > host1.local.lan.58484: Flags [F.], seq 213, ack 77, win 256, options [nop,nop,TS val 3281088735 ecr 1382488839], length 0
18:12:39.463683 IP host1.local.lan.58484 > 81.59.117.34.bc.googleusercontent.com.http: Flags [.], ack 214, win 2057, options [nop,nop,TS val 1382488860 ecr 3281088735], length 0