I've been receiving these error messages about SYN_ATK failures. I'm able to send data but I cannot receive it. I've reset my whole system from scratch over the past few days thinking it was a bug with proxmox or my router but neither one of those fixed the issue.
I ran this command on my vps/vpn (conntrack -L):
SYN_SENT src=10.0.4.246 dst=172.16.1.225 sport=45778 dport=80 [UNREPLIED] src=172.16.1.225 dst=10.0.4.246 sport=80 dport=45778 mark=0 use=1
SYN_SENT src=<my IP address> dst=<wireguard IP address> sport=60572 dport=443 [UNREPLIED] src=10.0.4.246 dst=<my IP address> sport=443 dport=60572 mark=0 use=1
SYN_SENT src=<my IP address> dst=<wireguard IP address> sport=63762 dport=25565 [UNREPLIED] src=172.16.1.225 dst=<my IP address> sport=25565 dport=63762 mark=0 use=1
I'm not sure what I'm missing. I have all the correct ports port forwarded and I receive pings on my vps/vpn:
/etc/wireguard# nc -zv 172.16.1.225 25565
Connection to 172.16.1.225 25565 port [tcp/*] succeeded!
/etc/wireguard# nc -zv 172.16.1.225 80
Connection to 172.16.1.225 80 port [tcp/http] succeeded!
/etc/wireguard# nc -zv 172.16.1.225 443
Connection to 172.16.1.225 443 port [tcp/https] succeeded!
At this point, I'm thinking it's an openwrt routing issue somewhere in my router but I'm unsure. Hopefully I can receive some tips on how I can fix this.
And instead of screenshots from your router, please copy the output of the following commands and post it here using the "Preformatted text </> " button:
Remember to redact passwords, MAC addresses and any public IP addresses you may have:
cat /etc/config/network
cat /etc/config/firewall
ip ro
ip ru
These rules are sitting on my VPN/VPS. I have my wireguard VPN setup to push all internal Ip addresses to my VPS and then it's supposed to port forward them externally using those rules. I'm wondering if my VPS blocked me for some reason; I doubt it though.
/etc/config/network
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd19:893c:9ae4::/48'
config device
option name 'br-lan'
option type 'bridge'
list ports 'eth1'
list ports 'eth2'
list ports 'eth3'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '172.16.1.1'
option netmask '255.255.255.0'
option ip6assign '60'
option ip4table '1'
config interface 'wan'
option device 'eth0'
option proto 'dhcp'
config interface 'wan6'
option device 'eth0'
option proto 'dhcpv6'
config device
option name 'eth0'
config interface 'vpnlan'
option device 'br-lan-vpn'
option proto 'static'
list ipaddr '10.0.4.1/24'
option ip4table '2'
config device
option type 'bridge'
option name 'br-lan-vpn'
option bridge_empty '1'
list ports 'eth4'
list ports 'wg1'
config interface 'wg1'
option proto 'wireguard'
option ip4table '3'
option private_key '<OMIT>
list addresses '10.10.20.0/24'
config wireguard_wg1
option description 'Pull'
option endpoint_host '<wireguard IP address>'
option endpoint_port '51821'
option persistent_keepalive '25'
option route_allowed_ips '1'
option public_key '<OMIT>'
option private_key '<OMIT>'
option preshared_key '<OMIT>'
list allowed_ips '0.0.0.0/0'
config rule 'vpnlan_wg1'
option in 'vpnlan'
option lookup '3'
option priority '30000'
config route
option interface 'wg1'
option target '0.0.0.0/0'
/etc/config/firewall
config defaults
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option synflood_protect '1'
config zone
option name 'lan'
list network 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
config zone
option name 'wan'
list network 'wan'
list network 'wan6'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
config forwarding
option src 'lan'
option dest 'wan'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config redirect
option dest 'lan'
option target 'DNAT'
option src 'wan'
option src_dport '25565'
option dest_port '25565'
option dest_ip '172.16.1.225'
config redirect
option dest 'lan'
option target 'DNAT'
option src 'wan'
option src_dport '443'
option dest_ip '172.16.1.196'
option dest_port '443'
config redirect
option dest 'lan'
option target 'DNAT'
option src 'wan'
option src_dport '80'
option dest_ip '172.16.1.196'
option dest_port '80'
config zone
option name 'vpnlan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
list network 'vpnlan'
list network 'wg1'
config forwarding 'vpnlan_lan'
option src 'vpnlan'
option dest 'lan'
config forwarding
option src 'lan'
config forwarding
option src 'lan'
option dest 'vpnlan'
ip ru
root@OpenWrt:~# ip ru
0: from all lookup local
10000: from 10.0.4.1 lookup 2
10000: from 10.10.20.0 lookup 3
10000: from 172.16.1.1 lookup 1
20000: from all to 10.0.4.1/24 lookup 2
20000: from all to 10.10.20.0/24 lookup 3
20000: from all to 172.16.1.1/24 lookup 1
30000: from all iif br-lan-vpn lookup 3
32766: from all lookup main
32767: from all lookup default
90008: from all iif lo lookup 1
90009: from all iif lo lookup 2
90011: from all iif lo lookup 3