Date: Thu, 29 Apr 2021 18:48:44 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 255497] net/wireguard-kmod (0.0.20210424_1) Message-ID: <bug-255497-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D255497 Bug ID: 255497 Summary: net/wireguard-kmod (0.0.20210424_1) Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: decke@FreeBSD.org Reporter: oleg@pcbtech.ru Assignee: decke@FreeBSD.org Flags: maintainer-feedback?(decke@FreeBSD.org) Hi all, I've to report a bug in wiregaurd-kmod. Here's my system: FreeBSD `hostname` 13.0-RELEASE FreeBSD 13.0-RELEASE #0 releng/13.0-n244733-ea31abc261f: Fri Apr 9 04:24:09 UTC 2021=20=20=20=20 root@releng1.nyi.freebsd.org:/usr/obj/usr/src/amd64.amd64/sys/GENERIC amd64 latest binary update, gitup'd latest release/13.0 src & ports. After update to wireguard-kmod-0.0.20210424_1 data going through vpn channel was dropped partly. It happened if the size of session is larger than megab= yte, so the ping works well - that's why I detected it after some time: my clien= ts started to worry that theirs mail (smtp via wg0) are tampered while sending= - the pictures got artifacts, archives came broken etc. At first, I've told'e= m to stop whinning and stop using m$ software as I several million times alreday recommend before =3D)) But in parallel I started to check things on the ser= vers, just to asure myself, and the first simple test fails =3D( [host] /home/user $ scp -p /tmp/k.zip user@192.168.x.y:/tmp/ Password for user@host: k.zip 3% 0 5.5MB/s 00:10 ETAFssh_packet_write_wa= it: Connection to 192.168.x.y port 22: Broken pipe lost connection ... again with verbose info: [host] /home/user $ scp -vp /tmp/k.zip user@192.168.x.y:/tmp/ Executing: program /usr/bin/ssh host 192.168.x.y, user user, command scp -v= -p -t /tmp/ OpenSSH_7.9p1, OpenSSL 1.1.1k-freebsd 25 Mar 2021 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Connecting to 192.168.x.y [192.168.x.y] port 22. debug1: Connection established. debug1: identity file /root/.ssh/id_rsa type -1 debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: identity file /root/.ssh/id_dsa type -1 debug1: identity file /root/.ssh/id_dsa-cert type -1 debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: identity file /root/.ssh/id_ed25519 type 3 debug1: identity file /root/.ssh/id_ed25519-cert type -1 debug1: identity file /root/.ssh/id_xmss type -1 debug1: identity file /root/.ssh/id_xmss-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.9 FreeBSD-20200214 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.9 FreeBSD-20200214 debug1: match: OpenSSH_7.9 FreeBSD-20200214 pat OpenSSH* compat 0x04000000 debug1: Authenticating to 192.168.x.y:22 as 'user' debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ecdsa-sha2-nistp256 SHA256:nA1uA8Ii0BI3oMOZRjjrdJOp3Jo1voo7EGv6h45ZXJ8 debug1: skipped DNS lookup for numerical hostname debug1: Host '192.168.x.y' is known and matches the ECDSA host key. debug1: Found key in /root/.ssh/known_hosts:10 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey after 134217728 blocks debug1: Will attempt key: /root/.ssh/id_rsa=20 debug1: Will attempt key: /root/.ssh/id_dsa=20 debug1: Will attempt key: /root/.ssh/id_ecdsa=20 debug1: Will attempt key: /root/.ssh/id_ed25519 ED25519 SHA256:..xxx... debug1: Will attempt key: /root/.ssh/id_xmss=20 debug1: SSH2_MSG_EXT_INFO received debug1: Fssh_kex_input_ext_info: server-sig-algs=3D<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ec= dsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Next authentication method: publickey debug1: Trying private key: /root/.ssh/id_rsa debug1: Trying private key: /root/.ssh/id_dsa debug1: Trying private key: /root/.ssh/id_ecdsa debug1: Offering public key: /root/.ssh/id_ed25519 ED25519 SHA256:..xxx... debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Trying private key: /root/.ssh/id_xmss debug1: Next authentication method: keyboard-interactive Password for user@host: debug1: Authentication succeeded (keyboard-interactive). Authenticated to 192.168.x.y ([192.168.x.y]:22). debug1: channel 0: new [client-session] debug1: Requesting no-more-sessions@o.com debug1: Entering interactive session. debug1: pledge: network debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_rep= ly 0 debug1: Sending command: scp -v -p -t /tmp/ File mtime 1619619978 atime 1619619968 Sending file timestamps: T1619619978 0 1619619968 0 Sink: T1619619978 0 1619619968 0 Sending file modes: C0644 59681372 k.zip Sink: C0644 59681372 k.zip k.zip 0% 0 0.0KB/s --:-- ETAFssh_packet_write_wa= it: Connection to 192.168.x.y port 22: Broken pipe lost connection Re-installation & restart of wireguard-kmod-0.0.20210424_1 $ scp -p /tmp/k.zip user@192.168.x.y:/tmp/ Password for user@host: k.zip 0% 0 0.0KB/s --:-- ETAFssh_packet_write_wa= it: Connection to 192.168.x.y port 22: Broken pipe $ scp -p /tmp/k.zip user@192.168.x.y:/tmp/ k.zip 18% 11MB 5.2MB/s 00:08 ETAFssh_packet_write_w= ait: Connection to 192.168.x.y port 22: Broken pipe lost connection Then I downgraded to previous build, =3D=3D=3D>>> Upgrade of wireguard-kmod-0.0.20210424_1 to wireguard-kmod-0.0= .20210415 complete and since then ever=D1=83thing was correct (I also checked it w/ checksum, = copied different files, etc.): $ scp -p /tmp/k.zip user@192.168.x.y:/tmp/ Password for user@host: k.zip 100% 57MB 4.5MB/s 00:12 The other side is FreeBSD 12.2-RELEASE-p6 i386, latest binary update, gitup= 'd ports & src, wireguard-kmod-0.0.20210424_1 works good, as well as previous build - here everething seens to be ok on any build number update: on the other size (12.2) there's a dovecot pop3 server and, in spite the fact that file scp'ing well, my clients had errors with wireguard-kmod-0.0.20210424_1: if mail is more than a couple of megabytes, = some attachments are broken (see above). I downgraded it to wireguard-kmod-0.0.20210415 too and the problem seems to stop. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-255497-7788>