GoatInTheMachine
New Around Here
Hi all - title pretty much says it all, but more details are below.
I've read through several discussions (example) regarding killswitch changes/issues. FWIW, it appears to me that most have concerned OpenVPN instead of Wireguard connections. AFAIK, none cites issues with NTP sync on boot as a possible cause.
Below I've included a few things that I've tried to fix this. Since the failure mode includes admin lock-out and necessitates a router reset, I've had a difficult time gaining transparency into the failure (i.e. accessing logs) and iterating through potential solutions. (Perhaps I could log to a USB device?) Currently my solution is to leave the killswitch disabled.
It's very possible that I'm missing something obvious and/or have a fundamental misunderstanding. I'm here to learn, so thanks in advance for sharing your thoughts!
VPN - WireGuard Client (
VPN Director rule:
On reboot (killswitch:
I've read through several discussions (example) regarding killswitch changes/issues. FWIW, it appears to me that most have concerned OpenVPN instead of Wireguard connections. AFAIK, none cites issues with NTP sync on boot as a possible cause.
Below I've included a few things that I've tried to fix this. Since the failure mode includes admin lock-out and necessitates a router reset, I've had a difficult time gaining transparency into the failure (i.e. accessing logs) and iterating through potential solutions. (Perhaps I could log to a USB device?) Currently my solution is to leave the killswitch disabled.
It's very possible that I'm missing something obvious and/or have a fundamental misunderstanding. I'm here to learn, so thanks in advance for sharing your thoughts!
Config ---------------------------------
RT-AX86U
3004.388.8_2
VPN - WireGuard Client (
WGC1
- commercial VPN):Peer -> Allowed IPs | 0.0.0.0/0,::0/0 |
VPN Director rule:
Local IP | Remote IP | Iface |
---|---|---|
0.0.0.0/0 | - | WGC1 |
Observations ---------------------------------
On reboot (killswitch:No
):- Nominal behavior (devices all have internet access via
WGC1
) - Log entries show very inaccurate time until NTP sync
On reboot (killswitch:
Yes
):- LAN devices have no internet access [WGC1 assumed down]
Possible explanation:
- internet access is blocked by killswitch until WGC1 initialization
- WGC1 initialization requires accurate time
- time is inaccurate until NTP sync
- NTP sync requires internet access
- [loop]
Fixes tried:
- Add staticNTP server IP
(tried local and public) to the WebUI NTP sync config; then, add VPN Director rule binding traffic fromrouter IP
toNTP server IP
to theWAN
Iface - LAN devices can communicate (ping, http) with peer LAN devices
- LAN devices cannot access router admin interfaces [http(s), ssh, ping] via
router LAN IP
Possible explanation:
- Unclear, but killswitch seems to block access to any resource beyondrouter LAN IP
Fixes tried:
- Add explicit VPN Director rules binding traffic between adevice LAN IP
androuter LAN IP
to theWAN
Iface
Questions ---------------------------------
- Is there a way to recover access to an admin interface without resetting the router? (It's a pain to test configs when the router needs a full reset each time.)
- Is a failed NTP sync actually causing issues, or is it a red-herring?
- I'm assuming that the killswitch is activated immediately upon clicking "Apply" (versus upon reboot). Is that correct?
- A similar thread suggests adding a VPN Director rule binding all traffic from
router LAN IP
to theWAN
Iface.- This rule seems like a more general version of the attempted fix above which binds "traffic from
router LAN IP
toNTP server IP
to theWAN
Iface", so it's unclear it would help. - As I understand it, this rule would bind all traffic from the router to the WAN Iface (instead of to WGC1), so it would prevent all router applications (e.g. AMTM AdGuard Home) from making requests through WGC1. This behavior seems undesirable to me, although I could be convinced otherwise.
- This rule seems like a more general version of the attempted fix above which binds "traffic from
- What else might I try? I suspect more specific Allowed IPs or VPN Director rules?
Last edited: