-
Notifications
You must be signed in to change notification settings - Fork 308
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VPN Routing Issue After 0.7.0-beta Update #1079
Comments
I do not understand this:
I've tested routing over an OpenVPN connection, and it worked fine via Now, we are aware that the traffic over Can you please clarify? |
Sorry, I had modified some of the IP addresses in the example (missed one), but the route I added did cover the actual IP of the target. In my case I'm using a different type of VPN (Zscaler) which rd0 doesn't seem to be able to route. I'm not exactly sure why it doesn't route on rd0, but here's another example of the issue using tcptraceroute. If you have anything else you want me to run to diagnose, I'd be happy to do so.
|
Thanks for the update. Is this purely a VPN configuration, or does it involve proxies as well? Is there any special routing on the host that only forwards packages from certain interfaces to the VPN? |
I'm unfortunately limited in understanding how this product actually functions under the hood. It's definitely different than a traditional OpenVPN-type VPN and I'm fairly certain it involves proxies. |
Can confirm 0.7.0-beta.1-57-g30155bd resolves this issue. Thank you! |
Unfortunately removing the local route for I've not found a way to split ingress/egress between 2 interfaces with just routing table entries; maybe it needs some iptables rules, but we are out of time to figure it out for the 0.7.0 release. So we'll have the slowdown for downloading a 4GB image from 13s to 90s (but thankfully no longer to 75m). For smaller images the slowdown may be barely noticeable. But if this is a problem for you, then you can work around this by adding the provisioning script to an
|
@jandubois Would it cause issues to reverse the priority of the default routes so eth0 is preferred over rd0? In my testing, this would fix my issue as well.
|
Yes, it works when Example routes when using a "bridged" network: lima-rancher-desktop:~$ ip route
default via 192.168.5.2 dev eth0 metric 202
default via 192.168.17.1 dev rd0 metric 203
10.42.0.0/24 dev cni0 scope link src 10.42.0.1
192.168.0.0/16 dev rd0 scope link src 192.168.18.110
192.168.5.0/24 dev eth0 scope link src 192.168.5.15 The higher metric for the default route doesn't matter if you have a more specific route with a longer prefix match. So in the example above, all connections to Eventually all the network settings should be exposed via the UI, but for now you would have to manually configure them via YAML files. Here is how you can revert $ cat "$HOME/Library/Application Support/rancher-desktop/lima/_config/override.yaml"
networks:
- lima: shared
interface: rd0
# restart Rancher Desktop after setting up override.yaml
$ rdlima ip route
default via 192.168.5.2 dev eth0 metric 202
default via 192.168.205.1 dev rd0 metric 203
192.168.5.0/24 dev eth0 scope link src 192.168.5.15
192.168.205.0/24 dev rd0 scope link src Since the shared network doesn't define (or need) a specific route for the local network, even local connection go over slirp and have the old speed. But of course you can't access And I'm sorry, I just realized that I've been mostly talking about the interface speed, and not the VPN issue. So it is possible that the bridged network will not interfere with your VPN because connections to local resources should not go over the VPN, and connections to VPN addresses should go over the SLIRP interface. If you want to double-check, I've been testing this with the build for Merge pull request #1107, which is |
Rancher Desktop-0.7.0-beta.1-103-g29dd7f2.dmg works for my use case. Thanks for providing an example override.yaml, this will be helpful in the interim. |
Thanks for letting me know! Was the |
I didn't need override.yaml for either to work with the new build. My understanding was that this is not being included in the 0.7.0 release and I will temporarily need it to make our VPN work, right? |
No, the build you tested is extremely similar to the imminent 0.7.0 release, so I'm happy to hear it works for you as-is. Switching to the shared network would still speed up access to resources in your local network, but maybe you don't access anything from there, so it doesn't matter? |
I'm getting reasonable pull speeds with the defaults on 0.7.0-beta.1-103-g29dd7f2 (with a full factory reset), so I think we're in good shape if this is similar to what 0.7.0 will be. |
I have tested with the latest official 0.7.1 release and everything looks good, closing the issue. |
Hi guys, I've been having issues with Lima not working properly if I have the firewall provided by my VPN service switched on (iVPN) - issues created here and here - just wondering since Rancher appears to use Lima, is there any straightfoward advice someone could offer for how to sidestep these issues? Perhaps a distillation of the above thread in the form of config file suggestions? As I'm not familiar with Lima and certainly not rancher. Many thanks! Should I create a And is this really a lima issue? Because if not then I'm in the wrong place :) |
Rancher Desktop Version
0.7.0-beta.1-32-g4c29159
Rancher Desktop K8s Version
1.21.7
What operating system are you using?
macOS
Operating System / Build Version
11.6.1
What CPU architecture are you using?
x64
Windows User Only
No response
Actual Behavior
After the update to 0.7.0-beta I'm seeing issues with network routing while using a VPN service, forcing me to add a route to the VM.
It appears to be related to adding a routable IP: 4363d48
lima-rancher-desktop:~$ ip route show
default via 192.168.205.1 dev rd0 metric 201
default via 192.168.5.2 dev eth0 metric 202
10.42.0.0/24 dev cni0 scope link src 10.42.0.1
100.64.1.0/24 via 192.168.5.2 dev eth0 <-- Needed to add a custom route to pull images over VPN
Steps to Reproduce
Install Rancher Desktop 0.7.0-beta application.
Connect to VPN service.
Attempt to pull image behind VPN using nerdctl
Result
Expected Behavior
Additional Information
This was working with 0.6.1 and is a regression with the current 0.7.0 candidate.
The text was updated successfully, but these errors were encountered: