slackhq / nebula

A scalable overlay networking tool with a focus on performance, simplicity and security
MIT License
14.33k stars 963 forks source link

Slow Windows Performance #589

Closed Stieneee closed 1 year ago

Stieneee commented 2 years ago

Hello, We are having issues with performance in Windows 10 using the newest release (1.5.0 and 1.4). We have been running iperf3 tests to understand the VPN network speeds, we have replicated this issue in a couple of environments mixing combinations of windows and Linux machines.

The issue was first seen in transfers from an Azure Server to client machines.

In summary, we see the worst performance when we are communicating windows to windows. slightly better performance windows Linux and near network speed performance Linux to Linux.

A sample of what have seen is below. In this scenario, two pcs are located on a local LAN between a Linux and Windows machine.
A direct iperf between these two machines yields a result ~800 Mbit/s and the nebula results:

PS C:\iperf-3.1.3-win32> .\iperf3 -R -c 10.15.15.4
Connecting to host 10.15.15.4, port 5201
Reverse mode, remote host 10.15.15.4 is sending
[  4] local 10.15.15.7 port 1063 connected to 10.15.15.4 port 5201
[ ID] Interval           Transfer     Bandwidth
[  4]   0.00-1.00   sec  1.14 MBytes  9.53 Mbits/sec
[  4]   1.00-2.00   sec   856 KBytes  7.01 Mbits/sec
[  4]   2.00-3.00   sec   790 KBytes  6.48 Mbits/sec
[  4]   3.00-4.00   sec  2.11 MBytes  17.7 Mbits/sec
[  4]   4.00-5.00   sec  1.82 MBytes  15.3 Mbits/sec
[  4]   5.00-6.00   sec   905 KBytes  7.40 Mbits/sec
[  4]   6.00-7.00   sec  1.08 MBytes  9.05 Mbits/sec
[  4]   7.00-8.00   sec  1.09 MBytes  9.14 Mbits/sec
[  4]   8.00-9.00   sec   724 KBytes  5.93 Mbits/sec
[  4]   9.00-10.00  sec   671 KBytes  5.50 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bandwidth       Retr
[  4]   0.00-10.00  sec  11.3 MBytes  9.51 Mbits/sec    2             sender
[  4]   0.00-10.00  sec  11.2 MBytes  9.41 Mbits/sec                  receiver

Where IP of the computer running the command is 10.15.15.7 (Windows), and the computer with iperf3 -s running is 10.15.15.4 (Linux). A connection to the lighthouse should have already been established. The lighthouse ip is 10.0.0.1. It should also be noted that we are using the wireguard Wintun drivers as well. We have modified the nebula config and environment trying various settings at the time of these results: read_buffer: (Currently at 20000000) write_buffer: (Currently at 20000000) tx_queue: (Currently at 1000) mtu: (Currently at 2300) cipher: AES Network adapter settings in windows

In addition, we have tried nebula/iperf3 with higher process priorities with only a minor 5-10% improvement.

In our worst-case scenario Azure server to windows desktop, we have seen download speeds peak at 1-2 Mbits/s when we expect the link speed to be closer to 100 Mbits/s

Overall, We have not had much luck with getting the download performance to be more than 30 Mbits/sec when a Windows machine is receiving data in any of the environments.

It should be noted that running iperf3 without the reverse flag (Sending from windows to a Linux machine) performs slightly but still well below the direct link speed

PS C:\iperf-3.1.3-win32> .\iperf3 -c 10.15.15.4
Connecting to host 10.15.15.4, port 5201
[  4] local 10.15.15.7 port 1209 connected to 10.15.15.4 port 5201
[ ID] Interval           Transfer     Bandwidth
[  4]   0.00-1.00   sec  4.98 MBytes  41.8 Mbits/sec
[  4]   1.00-2.00   sec  5.29 MBytes  44.4 Mbits/sec
[  4]   2.00-3.00   sec  5.04 MBytes  42.3 Mbits/sec
[  4]   3.00-4.00   sec  5.11 MBytes  42.8 Mbits/sec
[  4]   4.00-5.00   sec  5.04 MBytes  42.3 Mbits/sec
[  4]   5.00-6.00   sec  4.92 MBytes  41.3 Mbits/sec
[  4]   6.00-7.00   sec  5.04 MBytes  42.3 Mbits/sec
[  4]   7.00-8.00   sec  4.80 MBytes  40.2 Mbits/sec
[  4]   8.00-9.00   sec  4.80 MBytes  40.3 Mbits/sec
[  4]   9.00-10.00  sec  5.04 MBytes  42.3 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bandwidth
[  4]   0.00-10.00  sec  50.1 MBytes  42.0 Mbits/sec                  sender
[  4]   0.00-10.00  sec  50.0 MBytes  42.0 Mbits/sec                  receiver

Config File (same on both computers):

# PKI defines the location of credentials for this node. Each of these can also be inlined by using the YAML ": |" syntax.
pki:
  # The CAs that are accepted by this node. Must contain one or more certificates created by 'nebula-cert ca'
  ca: ./ca.crt
  cert: ./test/host.crt
  key: ./test/host.key

static_host_map:
  "10.0.0.1": ["<<<my lighthouse ip: port>>>"]

lighthouse:
  am_lighthouse: false
  interval: 60
  hosts:
    - "10.0.0.1"

# Port Nebula will be listening on. Using port 0 will dynamically assign a port.
listen:
  host: 0.0.0.0
  port: 0
  read_buffer: 20000000
  write_buffer: 20000000

punchy:
  punch: true
  respond: true

tun:
  disabled: false
  # Name of the device
  dev: nebula_vpn
  # Toggles forwarding of local broadcast packets, the address of which depends on the ip/mask encoded in pki.cert
  drop_local_broadcast: false
  # Toggles forwarding of multicast packets
  drop_multicast: false
  # Sets the transmit queue length, if you notice lots of transmit drops on the tun it may help to raise this number. Default is 500
  tx_queue: 10000
  # Default MTU for every packet, safe setting is (and the default) 1300 for internet based traffic
  mtu: 2300
  # Route based MTU overrides, you have known vpn ip paths that can support larger MTUs you can increase/decrease them here
  routes:
  unsafe_routes:

logging:
  # panic, fatal, error, warning, info, or debug. Default is info
  level: info
  format: text

# Nebula security group configuration
firewall:
  conntrack:
    tcp_timeout: 12m
    udp_timeout: 3m
    default_timeout: 10m
    max_connections: 100000

  outbound:
    # Allow all outbound traffic from this node
    - port: any
      proto: any
      host: any

  inbound:
    # Allow icmp between any nebula hosts
    - port: any
      proto: icmp
      host: any

    # Allow any protocol from any host within a network group
    - port: any
      proto: any
      group: group1

Config File (for the lighthouse):

# PKI defines the location of credentials for this node. Each of these can also be inlined by using the yaml ": |" syntax.
pki:
  # The CAs that are accepted by this node. Must contain one or more certificates created by 'nebula-cert ca'
  ca: ./ca.crt
  cert: ./lighthouse1/lighthouse1.crt
  key: ./lighthouse1/lighthouse1.key

lighthouse:
  am_lighthouse: true
  interval: 60

# Port Nebula will be listening on. Using port 0 will dynamically assign a port.
listen:
  host: 0.0.0.0
  port: 443

#
punch: 
  punchy: true
  punch_back: true

#cipher: chachapoly

tun:
  disabled: false
  # Name of the device
  dev: lighthouse-1
  # Toggles forwarding of local broadcast packets, the address of which depends on the ip/mask encoded in pki.cert
  drop_local_broadcast: false
  # Toggles forwarding of multicast packets
  drop_multicast: false
  # Sets the transmit queue length, if you notice lots of transmit drops on the tun it may help to raise this number. Default is 500
  tx_queue: 500
  # Default MTU for every packet, safe setting is (and the default) 1300 for internet based traffic
  mtu: 1300
  # Route based MTU overrides, you have known vpn ip paths that can support larger MTUs you can increase/decrease them here
  routes:
  unsafe_routes:

logging:
  # panic, fatal, error, warning, info, or debug. Default is info
  level: info
  format: text

# Nebula security group configuration
firewall:
  conntrack:
    tcp_timeout: 120h
    udp_timeout: 3m
    default_timeout: 10m
    max_connections: 100000
  outbound:
    - port: any
      proto: any
      host: any

  inbound:
    - port: any
      proto: any
      host: any

Output logs from nebula (with debug enabled while running the test):

time="2021-11-16T11:19:19-05:00" level=debug msg="Trusted CA fingerprints" fingerprints="[62b4b249e68c0312b251c420c5e7b475280b55603a6fa40e035f4591ddf17ed2]"
time="2021-11-16T11:19:19-05:00" level=debug msg="Client nebula certificate" cert="NebulaCertificate {\n\tDetails {\n\t\tName: 618eede181ee9368e0e073bc\n\t\tIps: [\n\t\t\t10.15.15.7/8\n\t\t]\n\t\tSubnets: []\n\t\tGroups: [\n\t\t\t\"6173027b606b663d7e61a181\"\n\t\t]\n\t\tNot before: 2021-11-12 18:00:10 -0500 EST\n\t\tNot After: 2022-10-20 11:04:42 -0400 EDT\n\t\tIs CA: false\n\t\tIssuer: 62b4b249e68c0312b251c420c5e7b475280b55603a6fa40e035f4591ddf17ed2\n\t\tPublic key: fe3a25cb3e58f69900db1e502cf134808b5737d22ce20c8b8a7633ca4d3c860b\n\t}\n\tFingerprint: f7d7b4f2b29604c0fb9cff0d53082d7f0220031c41134b52521efbce6e3235cd\n\tSignature: 483b64c564471302a9694aae227cf38f0714a3c98145de4d4286c770b4c3a15a5b6e700cb093c58d44e41d1542e9b7c5660f5209d27cec5ae29a9c6124671b08\n}"
time="2021-11-16T11:19:19-05:00" level=info msg="Firewall rule added" firewallRule="map[caName: caSha: direction:outgoing endPort:0 groups:[] host:any ip: proto:0 startPort:0]"
time="2021-11-16T11:19:19-05:00" level=info msg="Firewall rule added" firewallRule="map[caName: caSha: direction:incoming endPort:0 groups:[] host:any ip: proto:1 startPort:0]"
time="2021-11-16T11:19:19-05:00" level=info msg="Firewall rule added" firewallRule="map[caName: caSha: direction:incoming endPort:0 groups:[6173027b606b663d7e61a181] host: ip: proto:0 startPort:0]"
time="2021-11-16T11:19:19-05:00" level=info msg="Firewall started" firewallHash=dca22fcc82fb1d8e537eb86e117dab62a7c845a527577adc45f7dcecc5f081bf
2021/11/16 11:19:19 Using existing driver 0.14
2021/11/16 11:19:19 Creating adapter
time="2021-11-16T11:19:19-05:00" level=info msg="Main HostMap created" network=10.15.15.7/8 preferredRanges="[]"
time="2021-11-16T11:19:19-05:00" level=info msg="UDP hole punching enabled"
time="2021-11-16T11:19:20-05:00" level=info msg="Nebula interface is active" build=1.5.0 interface=nebula_vpn network=10.15.15.7/8 udpAddr="[::]:54266"
time="2021-11-16T11:19:20-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 24 58 255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 1 255 47 182 24 135 0 84 53 0 0 0 0 254 128 0 0 0 0 0 0 201 70 166 27 76 47 182 24]"
time="2021-11-16T11:19:20-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 8 58 255 254 128 0 0 0 0 0 0 201 70 166 27 76 47 182 24 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 2 133 0 11 141 0 0 0 0]"
time="2021-11-16T11:19:20-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 36 0 1 254 128 0 0 0 0 0 0 201 70 166 27 76 47 182 24 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 73 23 0 0 0 1 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 1 255 47 182 24]"
time="2021-11-16T11:19:20-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 36 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 186 66 0 0 0 1 3 0 0 0 255 2 0 0 0 0 0 0 0 0 0 1 255 47 182 24]"
time="2021-11-16T11:19:20-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 36 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 110 128 0 0 0 1 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 12]"
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 59907 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 56 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 106 117 0 0 0 2 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 1 0 3 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 251]"
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 63745 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 63746 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 49618 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="Generated index" index=4226112570
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=1 stored=true vpnIp=10.0.0.1
time="2021-11-16T11:19:20-05:00" level=debug msg="Generated index" index=885174028
time="2021-11-16T11:19:20-05:00" level=debug msg="HandshakeManager: triggered" vpnIp=10.0.0.1
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=1 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=2 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:20-05:00" level=info msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=4226112570 udpAddrs="[<PUBLIC IP>:443]" vpnIp=10.0.0.1
time="2021-11-16T11:19:20-05:00" level=info msg="Handshake message received" certName=lighthouse1 durationNs=20001300 fingerprint=05df2528b6ee8d033acebceb1b439419443bfdb178475905d0b1f75d472d0be6 handshake="map[stage:2 style:ix_psk0]" initiatorIndex=4226112570 issuer=62b4b249e68c0312b251c420c5e7b475280b55603a6fa40e035f4591ddf17ed2 remoteIndex=4226112570 responderIndex=2825880774 sentCachedPackets=1 udpAddr="<PUBLIC IP>:443" vpnIp=10.0.0.1
time="2021-11-16T11:19:20-05:00" level=debug msg="Hostmap vpnIp added" hostMap="map[hostinfo:map[existing:true hostId:10.0.0.1 localIndexId:4226112570] mapName:main mapTotalSize:1 vpnIp:10.0.0.1]"
time="2021-11-16T11:19:20-05:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:4226112570 mapName:pending mapTotalSize:1 remoteIndexNumber:2825880774 vpnIp:10.0.0.1]"
time="2021-11-16T11:19:20-05:00" level=debug msg="Sending 1 stored packets" certName=lighthouse1 vpnIp=10.0.0.1
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=3 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=4 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=5 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 55133 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:20-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 96 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 22 58 0 5 2 0 0 1 0 143 0 175 239 0 0 0 4 3 0 0 0 255 2 0 0 0 0 0 0 0 0 0 1 255 47 182 24 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 12 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 1 0 3 4 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 251]"
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=6 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=7 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:20-05:00" level=debug msg="Packet store" length=8 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:21-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:21-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:21-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:21-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:21-05:00" level=debug msg="Packet store" length=9 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:21-05:00" level=debug msg="Packet store" length=10 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:21-05:00" level=debug msg="Packet store" length=11 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:21-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=12 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=13 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=14 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=15 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 63271 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 60550 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 61784 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 54917 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=16 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=17 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=18 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 63271 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 60550 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 61784 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 54917 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=19 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=20 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=21 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="Packet store" length=22 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:22-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="Packet store" length=23 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:23-05:00" level=debug msg="Packet store" length=24 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:23-05:00" level=debug msg="Packet store" length=25 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:23-05:00" level=debug msg="Packet store" length=26 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:23-05:00" level=debug msg="Packet store" length=27 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:24-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 8 58 255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 2 133 0 123 184 0 0 0 0]"
time="2021-11-16T11:19:24-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:24-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:24-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="Packet store" length=28 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="Packet store" length=29 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="Packet store" length=30 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="Packet store" length=31 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 56558 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="Packet store" length=32 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 54519 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 61153 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55702 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:25-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 56558 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 54519 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 61153 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55702 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="Packet store" length=33 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:26-05:00" level=debug msg="Packet store" length=34 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:26-05:00" level=debug msg="Packet store" length=35 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:26-05:00" level=debug msg="Packet store" length=36 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:26-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:27-05:00" level=debug msg="Packet store" length=37 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:27-05:00" level=debug msg="Packet store" length=38 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:27-05:00" level=debug msg="Packet store" length=39 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:27-05:00" level=debug msg="Packet store" length=40 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:28-05:00" level=debug msg="Error while validating outbound packet: packet is not ipv4, type: 6" packet="[96 0 0 0 0 8 58 255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 255 2 0 0 0 0 0 0 0 0 0 0 0 0 0 2 133 0 123 184 0 0 0 0]"
time="2021-11-16T11:19:28-05:00" level=debug msg="Tunnel status" certName=lighthouse1 tunnelCheck="map[method:active state:testing]" vpnIp=10.0.0.1
time="2021-11-16T11:19:28-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:28-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:28-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:29-05:00" level=info msg="Handshake timed out" durationNs=8951588100 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=885174028 remoteIndex=0 udpAddrs="[]" vpnIp=10.255.255.255
time="2021-11-16T11:19:29-05:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:885174028 mapName:pending mapTotalSize:0 remoteIndexNumber:0 vpnIp:10.255.255.255]"
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38484 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="Generated index" index=947926788
time="2021-11-16T11:19:30-05:00" level=debug msg="Packet store" length=1 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:30-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:31-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:31-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:31-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:33-05:00" level=debug msg="Generated index" index=3255955150
time="2021-11-16T11:19:33-05:00" level=debug msg="Packet store" length=1 stored=true vpnIp=10.15.15.4
time="2021-11-16T11:19:33-05:00" level=debug msg="HandshakeManager: triggered" vpnIp=10.15.15.4
time="2021-11-16T11:19:33-05:00" level=info msg="Handshake message sent" handshake="map[stage:1 style:ix_psk0]" initiatorIndex=3255955150 udpAddrs="[104.195.135.3:39118 172.17.0.1:39118 172.18.0.1:39118 192.168.30.169:39118]" vpnIp=10.15.15.4
time="2021-11-16T11:19:33-05:00" level=info msg="Handshake message received" certName=617968c543d7b3908832502b durationNs=17733800 fingerprint=b4743dd1fc92890b8ac9fb8f58d129e24389a6bd2f841b6ddefd713e73d37ecb handshake="map[stage:2 style:ix_psk0]" initiatorIndex=3255955150 issuer=62b4b249e68c0312b251c420c5e7b475280b55603a6fa40e035f4591ddf17ed2 remoteIndex=3255955150 responderIndex=1219496328 sentCachedPackets=1 udpAddr="192.168.30.169:39118" vpnIp=10.15.15.4
time="2021-11-16T11:19:33-05:00" level=debug msg="Hostmap vpnIp added" hostMap="map[hostinfo:map[existing:true hostId:10.15.15.4 localIndexId:3255955150] mapName:main mapTotalSize:2 vpnIp:10.15.15.4]"
time="2021-11-16T11:19:33-05:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:3255955150 mapName:pending mapTotalSize:1 remoteIndexNumber:1219496328 vpnIp:10.15.15.4]"
time="2021-11-16T11:19:33-05:00" level=debug msg="Sending 1 stored packets" certName=617968c543d7b3908832502b vpnIp=10.15.15.4
time="2021-11-16T11:19:33-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:33-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="Packet store" length=2 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 50784 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="Packet store" length=3 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:34-05:00" level=debug msg="Packet store" length=4 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 49413 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="Packet store" length=5 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 56554 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 56587 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:34-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 55420 1900 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 50784 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 49413 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 56554 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 56587 5355 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="HandshakeManager: triggered" vpnIp=10.15.15.4
time="2021-11-16T11:19:35-05:00" level=debug msg="Packet store" length=6 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:35-05:00" level=debug msg="Packet store" length=7 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:35-05:00" level=debug msg="Packet store" length=8 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:35-05:00" level=debug msg="Packet store" length=9 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:35-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:36-05:00" level=debug msg="Packet store" length=10 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:36-05:00" level=debug msg="Packet store" length=11 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:36-05:00" level=debug msg="Packet store" length=12 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:36-05:00" level=debug msg="Packet store" length=13 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:36-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:36-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:36-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:36-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:36-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:36-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:37-05:00" level=debug msg="HandshakeManager: triggered" vpnIp=10.15.15.4
time="2021-11-16T11:19:37-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 59328 3702 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:37-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:37-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:38-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:39-05:00" level=debug msg="HandshakeManager: triggered" vpnIp=10.15.15.4
time="2021-11-16T11:19:39-05:00" level=info msg="Handshake timed out" durationNs=9341148000 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=947926788 remoteIndex=0 udpAddrs="[]" vpnIp=10.255.255.255
time="2021-11-16T11:19:39-05:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:947926788 mapName:pending mapTotalSize:0 remoteIndexNumber:0 vpnIp:10.255.255.255]"
time="2021-11-16T11:19:39-05:00" level=debug msg="Tunnel status" tunnelCheck="map[method:passive state:alive]" vpnIp=10.15.15.4
time="2021-11-16T11:19:39-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:39-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:40-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38484 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:40-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:40-05:00" level=debug msg="Generated index" index=87654736
time="2021-11-16T11:19:40-05:00" level=debug msg="Packet store" length=1 stored=true vpnIp=10.255.255.255
time="2021-11-16T11:19:40-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:40-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:40-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:40-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:40-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:41-05:00" level=debug msg="Tunnel status" tunnelCheck="map[method:active state:alive]" vpnIp=10.0.0.1
time="2021-11-16T11:19:41-05:00" level=debug msg="HandshakeManager: triggered" vpnIp=10.15.15.4
time="2021-11-16T11:19:41-05:00" level=debug msg="Sending a nebula test packet to vpn ip 10.15.15.4"
time="2021-11-16T11:19:43-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:43-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:45-05:00" level=debug msg="Sending a nebula test packet to vpn ip 10.15.15.4"
time="2021-11-16T11:19:46-05:00" level=debug msg="Tunnel status" tunnelCheck="map[method:passive state:alive]" vpnIp=10.15.15.4
time="2021-11-16T11:19:48-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:48-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:48-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:48-05:00" level=debug msg="Punching on 39118 for 10.15.15.4"
time="2021-11-16T11:19:49-05:00" level=debug msg="Tunnel status" tunnelCheck="map[method:passive state:alive]" vpnIp=10.0.0.1
time="2021-11-16T11:19:49-05:00" level=info msg="Handshake timed out" durationNs=9449298700 handshake="map[stage:1 style:ix_psk0]" initiatorIndex=87654736 remoteIndex=0 udpAddrs="[]" vpnIp=10.255.255.255
time="2021-11-16T11:19:49-05:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:87654736 mapName:pending mapTotalSize:0 remoteIndexNumber:0 vpnIp:10.255.255.255]"
time="2021-11-16T11:19:50-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38484 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:50-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:50-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:50-05:00" level=debug msg="HandshakeManager: triggered" vpnIp=10.15.15.4
time="2021-11-16T11:19:51-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:51-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:52-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:52-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:53-05:00" level=debug msg="Sending a nebula test packet to vpn ip 10.15.15.4"
time="2021-11-16T11:19:54-05:00" level=debug msg="Tunnel status" tunnelCheck="map[method:passive state:alive]" vpnIp=10.15.15.4
time="2021-11-16T11:19:54-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:54-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:54-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:58-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:58-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 5353 5353 17 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:19:59-05:00" level=debug msg="Tunnel status" tunnelCheck="map[method:passive state:alive]" vpnIp=10.0.0.1
time="2021-11-16T11:20:00-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38484 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:20:00-05:00" level=debug msg="dropping outbound packet, vpnIp not in our CIDR or in unsafe routes" fwPacket="&{10.15.15.7 <PUBLIC IP> 8704 38228 2 false}" vpnIp=<PUBLIC IP>
time="2021-11-16T11:20:00-05:00" level=info msg="Caught signal, shutting down" signal=interrupt
time="2021-11-16T11:20:00-05:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:4226112570 mapName:main mapTotalSize:1 remoteIndexNumber:2825880774 vpnIp:10.0.0.1]"
time="2021-11-16T11:20:00-05:00" level=debug msg="Sending close tunnel message" udpAddr="<PUBLIC IP>:443" vpnIp=10.0.0.1
time="2021-11-16T11:20:00-05:00" level=debug msg="deleting 10.15.15.4 from lighthouse."
time="2021-11-16T11:20:00-05:00" level=debug msg="Hostmap hostInfo deleted" hostMap="map[indexNumber:3255955150 mapName:main mapTotalSize:0 remoteIndexNumber:1219496328 vpnIp:10.15.15.4]"
time="2021-11-16T11:20:00-05:00" level=debug msg="Sending close tunnel message" udpAddr="192.168.30.169:39118" vpnIp=10.15.15.4
time="2021-11-16T11:20:00-05:00" level=info msg=Goodbye

Please let us know of anything else we can change, test or modify to help improve the results of nebula for Windows 10.

We are interested in the impact of #410 and wonder if we should wait for buffering to be enabled in Windows before we use it in our production environment.

I am working with @Curtis-MIlo he may answer your questions as well.

Thank you as well for all your hard work!!

Stieneee

nbrownus commented 2 years ago

This is expected since we haven't really paid any attention to windows performance until very recently. We have some early code that dramatically increases performance on windows over here. Would really appreciate your performance tests against this branch, if you don't mind building from source.

Stieneee commented 2 years ago

Nate,

We tried the build. Looks good. A quick summary

Local Lan Test (Down/Up Mbits/s from Windows perspective) Windows <-> Linux Direct Iperf - 800/800 1.5 - 40/9 26c1229b219160f7dc868ead5958d6a448f75973 - ~180/~180

Azure Previous Worst Case Scenario (Down/Up Mbits/s) Windows <-> Windows 1.5 - 1/10 26c1229b219160f7dc868ead5958d6a448f75973 - 120/10 Down/Up - Full Link Speed

Best Case Windows VM <-> Linux Host Virtual Box Bridged Network Adapter 26c1229b219160f7dc868ead5958d6a448f75973 1.5 Gbits/s / 900 Mbits/s (Down/Up Windows Guest)

We will try it out for a couple of days and let you know if we see anything out of the norm.

We don't have an explanation for the performance discrepancy between the Local Lan test and the VM Guest to Host test.

Any chance this branch will hit 1.6? Anything we can do to help?

bandicootdancing commented 2 years ago

The new branch looks promising.

I tested with two Windows hosts. One computer has a mechanical hard drive. http transfers with nebula on branch 26c1229 - 30MB/s http transfers without nebula - 60MB/s

http transfers with nebula release 1.5.0 - 200kbps

mohamm4d commented 2 years ago

Hello, Is there any progress regarding improvement of windows performance .

mohamm4d commented 2 years ago

The new branch looks promising.

I tested with two Windows hosts. One computer has a mechanical hard drive. http transfers with nebula on branch 26c1229 - 30MB/s http transfers without nebula - 60MB/s

http transfers with nebula release 1.5.0 - 200kbps

would you please retest with nebula release 1.6 ? Thanks

fabspro commented 2 years ago

I am finding it is still very slow with 1.6 and windows 10/server 2016. It would not be usable as a primary VPN for anything needing more than a couple of megs of throughput. With that said, it is highly reliable and is indispensable as a fallback pathway.

ArnoldIsHereToday commented 1 year ago

I just tested using Nebula 1.6.1 and I can download a file via FileZilla (client and server) directly at 14 MiB/s, but only at 312 KiB/s when I go through Nebula. That is a huge performance hit and makes nebula only usable for updating some configuration.

Is there any more effort being made to improve Windows performance?

red0888 commented 1 year ago

I just tested using Nebula 1.6.1 and I can download a file via FileZilla (client and server) directly at 14 MiB/s, but only at 312 KiB/s when I go through Nebula. That is a huge performance hit and makes nebula only usable for updating some configuration.

Is there any more effort being made to improve Windows performance?

Something similar for me. I get about 30 MB/s normal and with nebula i get like 150-350kb/s

red0888 commented 1 year ago

I hope the windows version gets more love from the devs.

oligaameiz commented 1 year ago

I hope the windows version gets more love from the devs.

+1

oligaameiz commented 1 year ago

Still waiting for nebula slove this problem.

johnmaguire commented 1 year ago

Hi @oligaameiz (and any others who might visit this ticket later) - the best way to show your support on a feature or bugfix is to vote using the 👍 emoji on the original post. Thanks!

robdplatt commented 1 year ago

PR #716 improves performance significantly. I did iperf tests in issue #814

Edit: I mistyped this as 176 earlier without realizing it. I'm sorry if that caused confusion.

lewishazell commented 1 year ago

I've created PR #882 to address this issue and I can now receive over 200Mb/s on Windows through iperf3.

robdplatt commented 1 year ago

There seems to be two PR's that lead to improved throughput, through different fixes.

PR #716 includes WinRIO (https://github.com/slackhq/nebula/pull/716/files#diff-c41559b853827d0421a9f1a2009a150c6f3c5ac37ed1fadfbfb6fdfa3c1884e0) PR #882 uses WSARecvFrom (https://github.com/slackhq/nebula/pull/882/commits/9717b3963d67ec2718ab8ce21a646608c73b123a#diff-c41559b853827d0421a9f1a2009a150c6f3c5ac37ed1fadfbfb6fdfa3c1884e0)

I'm curious about the differences between the two approaches.

I've been using the WinRIO code in a production environment for a few months.

lewishazell commented 1 year ago

@robdplatt You're right and I had no idea until after submitting my PR and rereading some of the first comments. I just assumed this had no fix since it's been almost two years. I'm also interested and I'll look at testing both.

I tried to keep the WSARecvFrom implementation as close as possible to the Linux SYS_RECVMMSG implementation to help maintainability. Still, performance is more important if there's a big difference.

I would like to see any solution merged. We've had 5Mbit/s to a gigabit server until today.

robdplatt commented 1 year ago

@lewishazell I'm excited to see how your approach works compared to the earlier one. Either way, once a solid fix is ready, maybe we can push to get it accepted.

nbrownus commented 1 year ago

Performance on Windows 10+ should be much better now since #905 has been merged.

azukaar commented 1 year ago

I am still seeing large performance issue on the latest version

Untitled-1 Untitled

CPUs and RAM are generous on both side (server is AMD 16 cores with 128gb ram, and desktop I7 8700k and 32gb). As a reference connecting a mac instead gets me 400-450mbps

I tried to play with different MTU values but didn't seem to make a huge difference

This is with this config:

# This is the nebula example configuration file. You must edit, at a minimum, the static_host_map, lighthouse, and firewall sections
# Some options in this file are HUPable, including the pki section. (A HUP will reload credentials from disk without affecting existing tunnels)

# PKI defines the location of credentials for this node. Each of these can also be inlined by using the yaml ": |" syntax.
pki:
  # The CAs that are accepted by this node. Must contain one or more certificates created by 'nebula-cert ca'
  ca: ./ca.crt
  cert: ./desktop.crt
  key: ./desktop.key
  # blocklist is a list of certificate fingerprints that we will refuse to talk to
  #blocklist:
  #  - c99d4e650533b92061b09918e838a5a0a6aaee21eed1d12fd937682865936c72
  # disconnect_invalid is a toggle to force a client to be disconnected if the certificate is expired or invalid.
  #disconnect_invalid: false

# The static host map defines a set of hosts with fixed IP addresses on the internet (or any network).
# A host can have multiple fixed IP addresses defined here, and nebula will try each when establishing a tunnel.
# The syntax is:
#   "{nebula ip}": ["{routable ip/dns name}:{routable port}"]
# Example, if your lighthouse has the nebula IP of 192.168.100.1 and has the real ip address of 100.64.22.11 and runs on port 4242:
static_host_map:
  "191.168.100.1": ["xxxxxxxxxxxxxxxxx:4242"]

# The static_map config stanza can be used to configure how the static_host_map behaves.
#static_map:
  # cadence determines how frequently DNS is re-queried for updated IP addresses when a static_host_map entry contains
  # a DNS name.
  #cadence: 30s

  # network determines the type of IP addresses to ask the DNS server for. The default is "ip4" because nodes typically
  # do not know their public IPv4 address. Connecting to the Lighthouse via IPv4 allows the Lighthouse to detect the
  # public address. Other valid options are "ip6" and "ip" (returns both.)
  #network: ip4

  # lookup_timeout is the DNS query timeout.
  #lookup_timeout: 250ms

lighthouse:
  # am_lighthouse is used to enable lighthouse functionality for a node. This should ONLY be true on nodes
  # you have configured to be lighthouses in your network
  am_lighthouse: false
  # serve_dns optionally starts a dns listener that responds to various queries and can even be
  # delegated to for resolution
  #serve_dns: false
  #dns:
    # The DNS host defines the IP to bind the dns listener to. This also allows binding to the nebula node IP.
    #host: 0.0.0.0
    #port: 53
  # interval is the number of seconds between updates from this node to a lighthouse.
  # during updates, a node sends information about its current IP addresses to each node.
  interval: 60
  # hosts is a list of lighthouse hosts this node should report to and query from
  # IMPORTANT: THIS SHOULD BE EMPTY ON LIGHTHOUSE NODES
  # IMPORTANT2: THIS SHOULD BE LIGHTHOUSES' NEBULA IPs, NOT LIGHTHOUSES' REAL ROUTABLE IPs
  hosts:
    - 191.168.100.1

  # remote_allow_list allows you to control ip ranges that this node will
  # consider when handshaking to another node. By default, any remote IPs are
  # allowed. You can provide CIDRs here with `true` to allow and `false` to
  # deny. The most specific CIDR rule applies to each remote. If all rules are
  # "allow", the default will be "deny", and vice-versa. If both "allow" and
  # "deny" IPv4 rules are present, then you MUST set a rule for "0.0.0.0/0" as
  # the default. Similarly if both "allow" and "deny" IPv6 rules are present,
  # then you MUST set a rule for "::/0" as the default.
  #remote_allow_list:
    # Example to block IPs from this subnet from being used for remote IPs.
    #"172.16.0.0/12": false

    # A more complicated example, allow public IPs but only private IPs from a specific subnet
    #"0.0.0.0/0": true
    #"10.0.0.0/8": false
    #"10.42.42.0/24": true

  # EXPERIMENTAL: This option may change or disappear in the future.
  # Optionally allows the definition of remote_allow_list blocks
  # specific to an inside VPN IP CIDR.
  #remote_allow_ranges:
    # This rule would only allow only private IPs for this VPN range
    #"10.42.42.0/24":
      #"192.168.0.0/16": true

  # local_allow_list allows you to filter which local IP addresses we advertise
  # to the lighthouses. This uses the same logic as `remote_allow_list`, but
  # additionally, you can specify an `interfaces` map of regular expressions
  # to match against interface names. The regexp must match the entire name.
  # All interface rules must be either true or false (and the default will be
  # the inverse). CIDR rules are matched after interface name rules.
  # Default is all local IP addresses.
  #local_allow_list:
    # Example to block tun0 and all docker interfaces.
    #interfaces:
      #tun0: false
      #'docker.*': false
    # Example to only advertise this subnet to the lighthouse.
    #"10.0.0.0/8": true

  # advertise_addrs are routable addresses that will be included along with discovered addresses to report to the
  # lighthouse, the format is "ip:port". `port` can be `0`, in which case the actual listening port will be used in its
  # place, useful if `listen.port` is set to 0.
  # This option is mainly useful when there are static ip addresses the host can be reached at that nebula can not
  # typically discover on its own. Examples being port forwarding or multiple paths to the internet.
  #advertise_addrs:
    #- "1.1.1.1:4242"
    #- "1.2.3.4:0" # port will be replaced with the real listening port

  # EXPERIMENTAL: This option may change or disappear in the future.
  # This setting allows us to "guess" what the remote might be for a host
  # while we wait for the lighthouse response.
  #calculated_remotes:
    # For any Nebula IPs in 10.0.10.0/24, this will apply the mask and add
    # the calculated IP as an initial remote (while we wait for the response
    # from the lighthouse). Both CIDRs must have the same mask size.
    # For example, Nebula IP 10.0.10.123 will have a calculated remote of
    # 192.168.1.123
    #10.0.10.0/24:
      #- mask: 192.168.1.0/24
      #  port: 4242

# Port Nebula will be listening on. The default here is 4242. For a lighthouse node, the port should be defined,
# however using port 0 will dynamically assign a port and is recommended for roaming nodes.
listen:
  # To listen on both any ipv4 and ipv6 use "::"
  host: 0.0.0.0
  port: 4242
  # Sets the max number of packets to pull from the kernel for each syscall (under systems that support recvmmsg)
  # default is 64, does not support reload
  #batch: 64
  # Configure socket buffers for the udp side (outside), leave unset to use the system defaults. Values will be doubled by the kernel
  # Default is net.core.rmem_default and net.core.wmem_default (/proc/sys/net/core/rmem_default and /proc/sys/net/core/rmem_default)
  # Maximum is limited by memory in the system, SO_RCVBUFFORCE and SO_SNDBUFFORCE is used to avoid having to raise the system wide
  # max, net.core.rmem_max and net.core.wmem_max
  # read_buffer: 10485760
  # write_buffer: 10485760
  # By default, Nebula replies to packets it has no tunnel for with a "recv_error" packet. This packet helps speed up reconnection
  # in the case that Nebula on either side did not shut down cleanly. This response can be abused as a way to discover if Nebula is running
  # on a host though. This option lets you configure if you want to send "recv_error" packets always, never, or only to private network remotes.
  # valid values: always, never, private
  # This setting is reloadable.
  #send_recv_error: always

# Routines is the number of thread pairs to run that consume from the tun and UDP queues.
# Currently, this defaults to 1 which means we have 1 tun queue reader and 1
# UDP queue reader. Setting this above one will set IFF_MULTI_QUEUE on the tun
# device and SO_REUSEPORT on the UDP socket to allow multiple queues.
# This option is only supported on Linux.
#routines: 1

punchy:
  # Continues to punch inbound/outbound at a regular interval to avoid expiration of firewall nat mappings
  punch: true

  # respond means that a node you are trying to reach will connect back out to you if your hole punching fails
  # this is extremely useful if one node is behind a difficult nat, such as a symmetric NAT
  # Default is false
  #respond: true

  # delays a punch response for misbehaving NATs, default is 1 second.
  #delay: 1s

  # set the delay before attempting punchy.respond. Default is 5 seconds. respond must be true to take effect.
  #respond_delay: 5s

# Cipher allows you to choose between the available ciphers for your network. Options are chachapoly or aes
# IMPORTANT: this value must be identical on ALL NODES/LIGHTHOUSES. We do not/will not support use of different ciphers simultaneously!
#cipher: aes

# Preferred ranges is used to define a hint about the local network ranges, which speeds up discovering the fastest
# path to a network adjacent nebula node.
# NOTE: the previous option "local_range" only allowed definition of a single range
# and has been deprecated for "preferred_ranges"
#preferred_ranges: ["172.16.0.0/24"]

# sshd can expose informational and administrative functions via ssh this is a
#sshd:
  # Toggles the feature
  #enabled: true
  # Host and port to listen on, port 22 is not allowed for your safety
  #listen: 127.0.0.1:2222
  # A file containing the ssh host private key to use
  # A decent way to generate one: ssh-keygen -t ed25519 -f ssh_host_ed25519_key -N "" < /dev/null
  #host_key: ./ssh_host_ed25519_key
  # A file containing a list of authorized public keys
  #authorized_users:
    #- user: steeeeve
      # keys can be an array of strings or single string
      #keys:
        #- "ssh public key string"

# EXPERIMENTAL: relay support for networks that can't establish direct connections.
relay:
  # Relays are a list of Nebula IP's that peers can use to relay packets to me.
  # IPs in this list must have am_relay set to true in their configs, otherwise
  # they will reject relay requests.
  #relays:
    #- 192.168.100.1
    #- <other Nebula VPN IPs of hosts used as relays to access me>
  # Set am_relay to true to permit other hosts to list my IP in their relays config. Default false.
  am_relay: false
  # Set use_relays to false to prevent this instance from attempting to establish connections through relays.
  # default true
  use_relays: true

# Configure the private interface. Note: addr is baked into the nebula certificate
tun:
  # When tun is disabled, a lighthouse can be started without a local tun interface (and therefore without root)
  disabled: false
  # Name of the device. If not set, a default will be chosen by the OS.
  # For macOS: if set, must be in the form `utun[0-9]+`.
  # For NetBSD: Required to be set, must be in the form `tun[0-9]+`
  dev: nebula1
  # Toggles forwarding of local broadcast packets, the address of which depends on the ip/mask encoded in pki.cert
  drop_local_broadcast: false
  # Toggles forwarding of multicast packets
  drop_multicast: false
  # Sets the transmit queue length, if you notice lots of transmit drops on the tun it may help to raise this number. Default is 500
  tx_queue: 500
  # Default MTU for every packet, safe setting is (and the default) 1300 for internet based traffic
  mtu: 1300

  # Route based MTU overrides, you have known vpn ip paths that can support larger MTUs you can increase/decrease them here
  routes:
    #- mtu: 8800
    #  route: 10.0.0.0/16

  # Unsafe routes allows you to route traffic over nebula to non-nebula nodes
  # Unsafe routes should be avoided unless you have hosts/services that cannot run nebula
  # NOTE: The nebula certificate of the "via" node *MUST* have the "route" defined as a subnet in its certificate
  # `mtu`: will default to tun mtu if this option is not specified
  # `metric`: will default to 0 if this option is not specified
  # `install`: will default to true, controls whether this route is installed in the systems routing table.
  unsafe_routes:
    #- route: 172.16.1.0/24
    #  via: 192.168.100.99
    #  mtu: 1300
    #  metric: 100
    #  install: true

  # On linux only, set to true to manage unsafe routes directly on the system route table with gateway routes instead of
  # in nebula configuration files. Default false, not reloadable.
  #use_system_route_table: false

# TODO
# Configure logging level
logging:
  # panic, fatal, error, warning, info, or debug. Default is info
  level: info
  # json or text formats currently available. Default is text
  format: text
  # Disable timestamp logging. useful when output is redirected to logging system that already adds timestamps. Default is false
  #disable_timestamp: true
  # timestamp format is specified in Go time format, see:
  #     https://golang.org/pkg/time/#pkg-constants
  # default when `format: json`: "2006-01-02T15:04:05Z07:00" (RFC3339)
  # default when `format: text`:
  #     when TTY attached: seconds since beginning of execution
  #     otherwise: "2006-01-02T15:04:05Z07:00" (RFC3339)
  # As an example, to log as RFC3339 with millisecond precision, set to:
  #timestamp_format: "2006-01-02T15:04:05.000Z07:00"

#stats:
  #type: graphite
  #prefix: nebula
  #protocol: tcp
  #host: 127.0.0.1:9999
  #interval: 10s

  #type: prometheus
  #listen: 127.0.0.1:8080
  #path: /metrics
  #namespace: prometheusns
  #subsystem: nebula
  #interval: 10s

  # enables counter metrics for meta packets
  #   e.g.: `messages.tx.handshake`
  # NOTE: `message.{tx,rx}.recv_error` is always emitted
  #message_metrics: false

  # enables detailed counter metrics for lighthouse packets
  #   e.g.: `lighthouse.rx.HostQuery`
  #lighthouse_metrics: false

# Handshake Manager Settings
#handshakes:
  # Handshakes are sent to all known addresses at each interval with a linear backoff,
  # Wait try_interval after the 1st attempt, 2 * try_interval after the 2nd, etc, until the handshake is older than timeout
  # A 100ms interval with the default 10 retries will give a handshake 5.5 seconds to resolve before timing out
  #try_interval: 100ms
  #retries: 20
  # trigger_buffer is the size of the buffer channel for quickly sending handshakes
  # after receiving the response for lighthouse queries
  #trigger_buffer: 64

# Nebula security group configuration
firewall:
  # Action to take when a packet is not allowed by the firewall rules.
  # Can be one of:
  #   `drop` (default): silently drop the packet.
  #   `reject`: send a reject reply.
  #     - For TCP, this will be a RST "Connection Reset" packet.
  #     - For other protocols, this will be an ICMP port unreachable packet.
  outbound_action: drop
  inbound_action: drop

  conntrack:
    tcp_timeout: 12m
    udp_timeout: 3m
    default_timeout: 10m

  # The firewall is default deny. There is no way to write a deny rule.
  # Rules are comprised of a protocol, port, and one or more of host, group, or CIDR
  # Logical evaluation is roughly: port AND proto AND (ca_sha OR ca_name) AND (host OR group OR groups OR cidr)
  # - port: Takes `0` or `any` as any, a single number `80`, a range `200-901`, or `fragment` to match second and further fragments of fragmented packets (since there is no port available).
  #   code: same as port but makes more sense when talking about ICMP, TODO: this is not currently implemented in a way that works, use `any`
  #   proto: `any`, `tcp`, `udp`, or `icmp`
  #   host: `any` or a literal hostname, ie `test-host`
  #   group: `any` or a literal group name, ie `default-group`
  #   groups: Same as group but accepts a list of values. Multiple values are AND'd together and a certificate would have to contain all groups to pass
  #   cidr: a remote CIDR, `0.0.0.0/0` is any.
  #   local_cidr: a local CIDR, `0.0.0.0/0` is any. This could be used to filter destinations when using unsafe_routes.
  #   ca_name: An issuing CA name
  #   ca_sha: An issuing CA shasum

  outbound:
    # Allow all outbound traffic from this node
    - port: any
      proto: any
      host: any

  inbound:
    # Allow icmp between any nebula hosts
    - port: any
      proto: any
      host: any

    # Allow tcp/443 from any host with BOTH laptop and home group
    # - port: 443
    #   proto: tcp
    #   groups:
    #     - laptop
    #     - home
johnmaguire commented 1 year ago

@azukaar The fix in #905 has not made it to a release build yet.

Perhaps try a nightly release? https://github.com/NebulaOSS/nebula-nightly/releases

Please file a new issue if that doesn't help.

azukaar commented 1 year ago

Yeah ok this is much better, got confused by the fact that this ticket was closed. Well done to this author of the PR I am assuming it should make it to release soon enough Thanks

Untitled