I am analysing why the wireguard connection does not work. It has something to do with MTU I guess.
ping 1.1.1.1
works but ping -s 1500 1.1.1.1
does not work. I was able to narrow it down to a dropped packet in sys-net
vm.
my setup is sys-vpn
→ sys-firewall (vif38)
→ sys-net (ens6)
→ router (also has a vpn) → vpn server connected from sys-vpn ip: 89.46.223.58. The tcpdump output below is from sys-net
.
The issue is sys-net
does not pass the packet with ID 57174 received from vpn server to sys-firewall
.
tcpdump from sys-net
11:02:34.299577 vif38.0 In IP (tos 0x0, ttl 63, id 10078, offset 0, flags [none], proto UDP (17), length 1392)
<sys-firewall ip>.33597 > 89.46.223.58.51820: UDP, length 1364
11:02:34.299622 ens6 Out IP (tos 0x0, ttl 62, id 10078, offset 0, flags [none], proto UDP (17), length 1392)
<sys-net ip>.33597 > 89.46.223.58.51820: UDP, length 1364
11:02:34.299627 vif38.0 In IP (tos 0x0, ttl 63, id 10079, offset 0, flags [none], proto UDP (17), length 284)
<sys-firewall ip>.33597 > 89.46.223.58.51820: UDP, length 256
11:02:34.300004 ens6 Out IP (tos 0x0, ttl 62, id 10079, offset 0, flags [none], proto UDP (17), length 284)
<sys-net ip>.33597 > 89.46.223.58.51820: UDP, length 256
11:02:34.402363 ens6 In IP (tos 0x0, ttl 50, id 57174, offset 0, flags [+], proto UDP (17), length 1364)
89.46.223.58.51820 > <sys-net ip>.33597: UDP, length 1408
11:02:34.402415 ens6 In IP (tos 0x0, ttl 50, id 57174, offset 1344, flags [none], proto UDP (17), length 92)
89.46.223.58 > <sys-net ip>: ip-proto-17
11:02:34.402478 ens6 In IP (tos 0x0, ttl 50, id 57175, offset 0, flags [none], proto UDP (17), length 252)
89.46.223.58.51820 > <sys-net ip>.33597: UDP, length 224
11:02:34.402501 vif38.0 Out IP (tos 0x0, ttl 49, id 57175, offset 0, flags [none], proto UDP (17), length 252)
89.46.223.58.51820 > <sys-firewall ip>.33597: UDP, length 224
nft input chain rules
chain input {
type filter hook input priority filter; policy drop;
jump custom-input
ct state invalid counter packets 11 bytes 15796 drop
iifgroup 2 udp dport 68 counter packets 0 bytes 0 drop
ct state established,related accept
iifgroup 2 meta l4proto icmp accept
iif "lo" accept
iifgroup 2 counter packets 0 bytes 0 reject with icmp host-prohibited
counter packets 10 bytes 840
}
Any idea what’s the problem here?