From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 97D1415803E for ; Thu, 4 Jan 2024 00:34:58 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 3EE542BC03E; Thu, 4 Jan 2024 00:34:53 +0000 (UTC) Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.126.187]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 51FC22BC01F for ; Thu, 4 Jan 2024 00:34:52 +0000 (UTC) Received: from georgi ([149.88.27.196]) by mrelayeu.kundenserver.de (mreue011 [212.227.15.167]) with ESMTPSA (Nemesis) id 1MXXdn-1riQfl3Ufn-00Z1nb for ; Thu, 04 Jan 2024 01:34:50 +0100 Date: Thu, 4 Jan 2024 01:34:50 +0100 From: Florian =?utf-8?Q?Gamb=C3=B6ck?= To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] Sending HUP to OpenVPN after WiFi reconnect in Mesh Message-ID: Mail-Followup-To: gentoo-user@lists.gentoo.org References: Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Provags-ID: V03:K1:qbBtHBpnMKq5JcZT+lp6W/Q0IRMm04HCZcRobGnVmH6+wNdpZmj KD7rwuc/2vZu1MB8Qb1PNYcADTPvTdn2m0M4CZ0TF2fJRpR342CalBwdR5Lm6q2R6WMBb3r 1ngWpp2h1vdhpYdFJIOCMlxlr+hoqycjmG6RJyKMuDVcNX+ebW7CL45qUcKXuuPD5Hhaylz KSIsJ68sn5DYDgP8SBzsw== X-Spam-Flag: NO UI-OutboundReport: notjunk:1;M01:P0:OKMrwZAJxLk=;uDERCL2a87nho8KZuxmKMFwLWMc Tl7FOReb3qMs5gPOyFuUuc0vp3Yk3F2Q/BPanXhPq4s8S2W4EPgzbJTZ8YBNmdQge9qxFhf7e U2WPnX5PRO+WVDrNS4C+HT73UXqpFyKyOR5H+Hfv4bCpJ+WDbmS5x/N4LaHwec9+ZYp1P0/jh CxKtLF4wxDGUUF+h0lwlKU/yfROGFG2n08o76bEaRAdbCZvsGct1nvgrp/KwYVhUK9B/5VzPl mSu1mE4wKe0OXEdaY065FfNmWPuHaiID5Byv8CrU+SE+3NbFOa7oPqlmiChMZ9a4ISoGd8cog Y2JKG4BcBL+6LHMZ+v3WextDT692K3p0064uBPj/5XEvM9jMzY4u6ODzt68kqoJXuyhshbAm5 HdvKZpixQSXNlieOrr+vYfpxr0nnA/FgEzCSwk644pz0NBXIH0MdArtO31kcyq1rhdTCXbHGk f/wFNakw1GktVBEJ/ULxYKIigmONXLFhaQAh/nVQjeEJdKcDyVWpCsDHJm5j7QDAX0RRg68eP XXM8VTuKFy142UHFikkBwhKyTauNb5m0/rF67pGkewqedriyHS8rDMexkRJwGZOCYnqTxT5YU EWD+kwvpauc8Zs8BI+cJ3MLIsymGO07UlTr78T27Ws41Sll8yroJGrcltuCVYSTe2k8nsYxzi +tA7iuT6rxqpT9zTcwX48vFlAvB7YRNUEZV32k0I6/ifsCG3rUPZoI2AWb05LJ/DMADRbFVTj fXYZbC4V9CH0p3B25QBMcsajKcHIFlYjGXpw67h+Ni892Lj79nM/2Nr9iH8IWt5vNMmY7oIXn voeuF0UPRQq6M/jpUS0emM0KdfL/8cbOr0XU5V2cyFefDvnufJv3pd99o6Ojj8N0Zw2ztDfPS d8utgjpK25CICAQ== X-Archives-Salt: 1ee1c8d9-868b-4bd0-bd11-b23d638fdfca X-Archives-Hash: 9b7746f1d48157786df501e9029fcb1a Hi Hoël, thanks for your response! On 2024-01-03 18:11, Hoël Bézier wrote: > I’ve encountered the same issue as you. I fixed it by removing the > persist-tun option from my configuration file. > > The way I understand this configuration option, is that OpenVPN allows > itself to destroy and recreate tun interfaces if needed. I’m not sure > whether it means you may end up on the internet without going through > your VPN. I tried again to remove the "persist-tun" option, and indeed I can now reconnect also via SIGUSR1 without problems. Also all traffic is blocked / dropped while waiting for the server timeout, so at least I'm not left open in the wild without VPN. > I’d be very interested if anyone had further information on that > matter, whether they would contredict my claims or support them. Yes, even though USR1 works now without falling back to no-VPN routing, if someone can give a little more insight if removing "persist-tun" is the way to go here would be nice! So at least one of the issues is "solved" for now, but the main problem still remains: How can I properly detect Mesh roaming and react timely to send HUP or USR1 to OpenVPN? I'm still thinking about some sort of wpa_supplicant "hook" mechanism for these roaming events, but I cannot find something like this in the docs ... Kind regards FloGa