Project

General

Profile

Actions

Bug #15140

open

Remote syslog servers on dynamically routed networks are being sent out default GW after reboot when using source IP of "lan"

Added by James Blanton 4 months ago. Updated 4 months ago.

Status:
Incomplete
Priority:
Normal
Assignee:
-
Category:
Logging
Target version:
-
Start date:
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
Release Notes:
Default
Affected Version:
Affected Architecture:
All

Description

Syslogd is started before any packages are started, including the FRR package. If any remote syslog servers are on a network whose route is learned over BGP, then this traffic will be routed to the default gateway initially. This is expected behavior, since the FRR package hasn't been loaded and no BGP routes have been received.

The problem is that the traffic is NOT being redirected after BGP routes are established due to the state that was created initially by routing the traffic through the default GW.

In my specific case, I've got a remote site sending syslog traffic over an OpenVPN tunnel with BGP routing between sites. When the remote router reboots, the syslog messages are routed out of the WAN interface, creating a state with an "src-org" of the LAN IP and "src" of the WAN IP. After the FRR package starts and the BGP routes are received, these messages continue to go out of the WAN interface until the state is killed.

I originally reported this bug with #14403, but was told:

This is a configuration issue -- if traffic is taking a path you don't want when the VPN is down, you need to add rules to block it (e.g. reject it outbound on WAN via floating rules).

However, this does not work either. While it does prevent the traffic from exiting the WAN interface, the syslog messages are still not being routed properly after the BGP routes are received. This began occurring for me originally on 23.01, but is still occurring in 23.09.1.

I was able to get this working by adding some code in to the "/etc/rc.state_packages" script in the foreach loop that starts that packages that checks to see if the FRR package was just started, then looks to see if any remote syslog servers were configured. If there were any servers configured, then it sleeps for 15 seconds (to give time for the BGP peering to start) before looping through the servers and checking for any existing states. If any states exists, it checks for a "src-org" field and compares it to the "src" field. If the "src" and "src-org" don't match, then it kills that state. I have tested this change with 23.09.1, and it has been working as expected.

Actions #2

Updated by Marcos M 4 months ago

While it does prevent the traffic from exiting the WAN interface, the syslog messages are still not being routed properly after the BGP routes are received.

What's the reason for that? It seems like fixing that (presuming it's a bug/config issue) would be best in this case.

Actions #3

Updated by James Blanton 4 months ago

Marcos M wrote in #note-2:

While it does prevent the traffic from exiting the WAN interface, the syslog messages are still not being routed properly after the BGP routes are received.

What's the reason for that? It seems like fixing that (presuming it's a bug/config issue) would be best in this case.

I couldn't tell you that. It's like once it couldn't send the messages, it stopped trying to send them. But, if I recall correctly, it would work if I went back and restarted the syslogd service. At any rate, the best fix is going to be killing that state. In my opinion, anything else is just a band-aid.

Actions #4

Updated by Marcos M 4 months ago

  • Status changed from Pull Request Review to Incomplete

OK, it's best to track that down for this report (possibly discuss further in the forums). The overall "state" issue can be tracked with #14059.

Actions #5

Updated by Marcos M 4 months ago

  • Project changed from pfSense Plus to pfSense
  • Category changed from Logging to Logging
  • Affected Plus Version deleted (23.01)
Actions

Also available in: Atom PDF