From owner-freebsd-bugs@freebsd.org Thu Mar 29 19:28:19 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2ECBFF6F974 for ; Thu, 29 Mar 2018 19:28:19 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A6DB57F44C for ; Thu, 29 Mar 2018 19:28:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 06CEE26740 for ; Thu, 29 Mar 2018 19:28:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id w2TJSHxG064036 for ; Thu, 29 Mar 2018 19:28:17 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id w2TJSH9Z064035 for freebsd-bugs@FreeBSD.org; Thu, 29 Mar 2018 19:28:17 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 227086] Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists Date: Thu, 29 Mar 2018 19:28:17 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: 11.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: zillion1@o2.pl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Mar 2018 19:28:19 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D227086 Bug ID: 227086 Summary: Upgraded world - broken OpenVPN second tun - ifconfig: ioctl (SIOCAIFADDR): File exists Product: Base System Version: 11.1-STABLE Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: misc Assignee: freebsd-bugs@FreeBSD.org Reporter: zillion1@o2.pl Hello, Long time I didn't upgrade my FreeBSD 11-STABLE world, so I did it today. Unfortunately my working OpenVPN configuration failed to start correctly. My config is: server and client on the same host. Server starts just fine, the tun0 device gets up, but client doesn't config= ure tun1 device. Log says: Thu Mar 29 16:09:53 2018 OpenVPN 2.4.5 amd64-portbld-freebsd11.1 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Mar 16 2018 Thu Mar 29 16:09:53 2018 library versions: OpenSSL 1.0.2o-freebsd 27 Mar 2= 018, LZO 2.10 Thu Mar 29 16:09:53 2018 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Thu Mar 29 16:09:53 2018 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Mar 29 16:09:53 2018 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Thu Mar 29 16:09:53 2018 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Mar 29 16:09:53 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.0.1:1194 Thu Mar 29 16:09:53 2018 Socket Buffers: R=3D[41600->41600] S=3D[9216->9216] Thu Mar 29 16:09:53 2018 UDP link local: (not bound) Thu Mar 29 16:09:53 2018 UDP link remote: [AF_INET]192.168.0.1:1194 Thu Mar 29 16:09:53 2018 TLS: Initial packet from [AF_INET]192.168.0.1:1194, sid=3D9a9d27d1 1a2ad740 Thu Mar 29 16:09:53 2018 VERIFY OK: depth=3D1, C=3DPL, ST=3Dxxx, L=3Daaa, O= =3DOpenVPN Server, OU=3DOpenVPN, CN=3DOpenVPN Server CA, name=3Dbbb, emailAddress=3Dab= c@xyz.pl Thu Mar 29 16:09:53 2018 VERIFY KU OK Thu Mar 29 16:09:53 2018 Validating certificate extended key usage Thu Mar 29 16:09:53 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Mar 29 16:09:53 2018 VERIFY EKU OK Thu Mar 29 16:09:53 2018 VERIFY OK: depth=3D0, C=3DPL, ST=3Dxxx, L=3Daaa, O= =3DOpenVPN Server, OU=3DOpenVPN, CN=3DOpenVPN Server CA, name=3Dbbb, emailAddress=3Dab= c@xyz.pl Thu Mar 29 16:09:53 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Mar 29 16:09:53 2018 [server] Peer Connection Initiated with [AF_INET]192.168.0.1:1194 Thu Mar 29 16:09:54 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=3D1) Thu Mar 29 16:09:54 2018 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.20.20.1,topology subnet,ping 5,ping-restart 10,ifconfig 10.20.20.10 255.255.255.0,peer-id 11,cipher AES-256-GCM' Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: timers and/or timeouts modified Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: --ifconfig/up options modified Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: route-related options modified Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: peer-id set Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: adjusting link_mtu to 1625 Thu Mar 29 16:09:54 2018 OPTIONS IMPORT: data channel crypto options modifi= ed Thu Mar 29 16:09:54 2018 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Mar 29 16:09:54 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Mar 29 16:09:54 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Mar 29 16:09:54 2018 TUN/TAP device /dev/tun1 opened Thu Mar 29 16:09:54 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=3D0 Thu Mar 29 16:09:54 2018 /sbin/ifconfig tun1 10.20.20.10 10.0.20.1 mtu 1500 netmask 255.255.255.0 up ifconfig: ioctl (SIOCAIFADDR): File exists Thu Mar 29 16:09:54 2018 FreeBSD ifconfig failed: external program exited w= ith error status: 1 Thu Mar 29 16:09:54 2018 Exiting due to fatal error I reverted whole system from backup, where's no problem with client (here is after client restart log): Thu Mar 29 21:16:14 2018 OpenVPN 2.4.5 amd64-portbld-freebsd11.1 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Mar 16 2018 Thu Mar 29 21:16:14 2018 library versions: OpenSSL 1.0.2k-freebsd 26 Jan 2= 017, LZO 2.10 Thu Mar 29 21:16:14 2018 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Thu Mar 29 21:16:14 2018 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Mar 29 21:16:14 2018 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Thu Mar 29 21:16:14 2018 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Mar 29 21:16:14 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.0.1:1194 Thu Mar 29 21:16:14 2018 Socket Buffers: R=3D[41600->41600] S=3D[9216->9216] Thu Mar 29 21:16:14 2018 UDP link local: (not bound) Thu Mar 29 21:16:14 2018 UDP link remote: [AF_INET]192.168.0.1:1194 Thu Mar 29 21:16:14 2018 TLS: Initial packet from [AF_INET]192.168.0.1:1194, sid=3Dfe0a85cd 957bd051 Thu Mar 29 21:16:14 2018 VERIFY OK: depth=3D1, C=3DPL, ST=3Dxxx, L=3Daaa, O= =3DOpenVPN Server, OU=3DOpenVPN, CN=3DOpenVPN Server CA, name=3Dbbb, emailAddress=3Dab= c@xyz.pl Thu Mar 29 21:16:14 2018 VERIFY KU OK Thu Mar 29 21:16:14 2018 Validating certificate extended key usage Thu Mar 29 21:16:14 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Mar 29 21:16:14 2018 VERIFY EKU OK Thu Mar 29 21:16:14 2018 VERIFY OK: depth=3D0, C=3DPL, ST=3Dxxx, L=3Daaa, O= =3DOpenVPN Server, OU=3DOpenVPN, CN=3DOpenVPN Server CA, name=3Dbbb, emailAddress=3Dab= c@xyz.pl Thu Mar 29 21:16:14 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Mar 29 21:16:14 2018 [server] Peer Connection Initiated with [AF_INET]192.168.0.1:1194 Thu Mar 29 21:16:16 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=3D1) Thu Mar 29 21:16:16 2018 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.20.20.1,topology subnet,ping 5,ping-restart 10,ifconfig 10.20.20.10 255.255.255.0,peer-id 17,cipher AES-256-GCM' Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: timers and/or timeouts modified Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: --ifconfig/up options modified Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: route-related options modified Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: peer-id set Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: adjusting link_mtu to 1625 Thu Mar 29 21:16:16 2018 OPTIONS IMPORT: data channel crypto options modifi= ed Thu Mar 29 21:16:16 2018 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Mar 29 21:16:16 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Mar 29 21:16:16 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Mar 29 21:16:16 2018 TUN/TAP device /dev/tun1 opened Thu Mar 29 21:16:16 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=3D0 Thu Mar 29 21:16:16 2018 /sbin/ifconfig tun1 10.20.20.10 10.20.20.1 mtu 1500 netmask 255.255.255.0 up Thu Mar 29 21:16:16 2018 /sbin/route add -net 10.20.20.0 10.20.20.1 255.255.255.0 add net 10.20.20.0: gateway 10.20.20.1 fib 0: route already in table Thu Mar 29 21:16:16 2018 ERROR: FreeBSD route add command failed: external program exited with error status: 1 Thu Mar 29 21:16:16 2018 Initialization Sequence Completed Working revision: 11.1-STABLE r323310 - both tun devices are bringing up, so server and client works flawesly, r331740 failed. --=20 You are receiving this mail because: You are the assignee for the bug.=