@egc may I ask if the 09-stop-wan-leak script is going to be embedded by default to the luci-app-pbr package at some point so that we do not have to manually place it in the desired location every time we do a fw update? It appears that by clicking retaining the config upon upgrade, it does not keep this file in place and we have to copy it over again.
Shall I raise an “issue” in pbr’s github section to get the change in a formal and transparent manner? Or there is no easy way to apply this script upstream so that everyone gets benefitted automatically?
At the moment I am in bed with the flu but will think about it when I get better.
Before even contemplating adding it I need to add discovery of the wan interface by using the pbr uplink interface WANIF="$(uci -q get pbr.config.uplink_interface)" and also a config item in PBR to disable/enable it option stop_wan_leak_on_start '1'
Will get back to you with a new version when I am well again
Hi, I’ve been dealing with a persistent issue with PBR that was resolved in a previous version but has since reappeared.
When the default service gateway is set to the VPN and I create a policy to route the entire LAN subnet (192.168.1.1/24) through WAN, everything works fine. The LAN connects to services, but if an interface goes down or something similar happens, PBR attempts to "restart," which fails to work properly. I also utilize the hotplug script, but it doesn't make a difference. As a result, once PBR tries to recover from a downed interface, I lose access to those LAN services until I manually restart PBR through the web interface. Even if it says "running."
Firewall Example:
Lan -> services
Can anyone advise me on how to fix this? I remember there was a version that didn’t have this problem, but I can't recall which one.
It looks like it's functioning now, thanks! I upgraded to the latest version through the repo and switched to using @ as well. I didn’t bother removing the hotplug script since it’s working fine now. However, I noticed that PBR tends to leak traffic when you restart the WAN/VPN (service gateways) or PBR. If an interface has both VPN and WAN, and you route that interface through the VPN, it still leaks traffic to the WAN during a restart. The same issue occurs in the opposite scenario.
Great to hear it is working, probably upgrading is what did the trick as older versions were lacking local routes in the tables.
to be sure we are on the same page what script are you referring to?
A leak is normal when using PBR there are several ways to mitigate that, in your case making a traffic rule to REJECT traffic from LAN > WAN looks like the way to go
Can someone confirm if the DSCP tagging works for them? I am on OpenWrt 24.10.5 with PBR version 1.2.1-r47 but can’t seem to get the DSCP tag for AmneziaWG interface, specifically for Firefox under Windows to work anymore. The URL policies are working but DSCP tagged browser still goes through the default WAN interface.
How do I troubleshoot this? I don’t recall exactly when this started happening either so can’t back track to make it work.
——–
Update: went back to PBR Version 1.2.0-r6 and all is normal now…….