Wireguard Shows Data in/out but no handshake


bpage

Recommended Posts

I am trying to figure out why wireguard isn't working.

 

unRAID: 6.8.0-rc9

Router: pfSense with port 51829 forwarded to local ip of unRAID

I have vpn.mydomain.com forwarded to my WAN address.

 

Using the wireguard plugin, i generated a tunnel and generated a client with remote access to lan. I used the iOS Mobile app to scan the config from the server. The iOS app "activates" and I can see small amounts of data sent and data received but no handshake occurs, and nothing is asseciable over the tunnel.

 

My server has a Ethernet bond that is set to bridge. Maybe network adjustments need to be made at the pfsense level?

 

Configs are attached.

 

1760000215_ScreenShot2019-12-10at12_28_34PM.png.40eaf0c656ed079750e04d6940491c5c.png

 

 

Screen Shot 2019-12-10 at 12.30.45 PM.png

Link to comment
  • 3 weeks later...

I'm having the same issue.

I setup WG VPN on my Unraid server.  My router has UPnP turned off, so I setup the port forward to my unraid server.

Went through all the steps on this guide created by user ljm42.

 

I left "Local server uses NAT" set to "yes."   Not sure too much of what this means, this might be relating to my problem.

 

Setup a peer as peer type "Remote access to LAN"

Used the QR Code method to setup this config on my iPhone.

Tried to connect to my Unraid VPN using my iPhone (while on cellular)

 

iPhone network works fine (its using LTE without VPN).  Cannot connect to Unraid WebUI or anything else on my local LAN.

Unraid dashboard shows some data in/out but shows handshake as "not received"

 

I can't figure out why the iPhone and Unraid can't seem to handshake with each other.

Sorry I don't have any help for you, but figured I'd share that I'm experiencing the same problem.

 

Edit:
Should also include my router is an EdgeRouter X-SFP and I have duckdns DDNS setup on my unraid already but figured for simplicity sake, not to enter my DDNS into the WG VPN setup until I could get it working with the automatically entered public IP.

Edited by charlescc1000
Link to comment
  • 7 months later...
  • 6 months later...

I got it figured !!!

 

I have two nics on my mobo and couln't get "remote tunneled access" to work (no internet, no local access, just some in/out/ data but no handshake)

with 

 

root@Tower:~# ip route
default via 192.168.2.1 dev br1 
10.253.0.2 dev wg0 scope link 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 
172.18.0.0/16 dev br-8352ee8270e2 proto kernel scope link src 172.18.0.1 linkdown 
192.168.2.0/24 dev br0 proto kernel scope link src 192.168.2.200 
192.168.2.0/24 dev br1 proto kernel scope link src 192.168.2.201

 

 

i found that my main IP of unraid that I forwarded the UDP port to was not in use by wireguard, but the second IP I had. Thus I just switched the portforwarding from the main IP to the secondary IP and now everything ist working like a charme.

 

Best,

Banu

Edited by Banuseka
added extra code
Link to comment
11 hours ago, Banuseka said:

i found that my main IP of unraid that I forwarded the UDP port to was not in use by wireguard, but the second IP I had. Thus I just switched the portforwarding from the main IP to the secondary IP and now everything ist working like a charme.

 

You really shouldn't have two un-bonded nics plugged into the same network. Networking isn't meant to work that way, you could have any number of random, hard to track down problems in the future.

Link to comment
12 hours ago, ljm42 said:

 

You really shouldn't have two un-bonded nics plugged into the same network. Networking isn't meant to work that way, you could have any number of random, hard to track down problems in the future.

Good call !

 

Now switched to Bonding (balanced-rr). guess this is better. THX for the advice!

Link to comment
10 hours ago, Banuseka said:

Good call !

 

Now switched to Bonding (balanced-rr). guess this is better. THX for the advice!

 

Cool. I am not an expert with this, but note that your switch also has to be configured to support this type of bond. I found some info here:

  https://wiki.linuxfoundation.org/networking/bonding#switch_configuration

 

If your switch does not support "balanced-rr" or isn't specifically configured for it, the "active-backup" bond is probably best.

Link to comment
On 2/17/2021 at 10:10 PM, ljm42 said:

 

Cool. I am not an expert with this, but note that your switch also has to be configured to support this type of bond. I found some info here:

  https://wiki.linuxfoundation.org/networking/bonding#switch_configuration

 

If your switch does not support "balanced-rr" or isn't specifically configured for it, the "active-backup" bond is probably best.

Yh, thx! Figured that as well:) luckily my switch supports LAG and the modes:)

Edited by Banuseka
  • Like 1
Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.