Thanks a lot for your deeply and clearly explanations ;-)

Based on your analysise for my case,  I've tried the following method so
that I can let the nntp to use the
original default routes and it does the trick:

 route add -host news.rusnet.ru gw 192.168.0.1

As for other methods you mentioned in the previous thread, I'll try them
one-by-one ;-)

Thanks again.

Regards

2015-04-03 19:38 GMT+08:00 Duncan <1i5t5.dun...@cox.net>:

> Hongyi Zhao posted on Fri, 03 Apr 2015 16:23:33 +0800 as excerpted:
>
> > Are there any workarounds for this case if I want to use Pan2 under vpn
> > environments?
>
> I had a reply mostly composed earlier, but then decided I didn't know
> enough about your intent and was making too many unwarranted assumptions
> in the post as it was written, so I killed it without sending.  This time
> I'll use two questions and explain the results of both answers, for both,
> avoiding that problem.
>
>
> I should however mention that I don't claim to be a routing expert and
> have basically no experience at all with VPNs.  Tho I know a reasonable
> amount about IPv4 basics including routing in general, see that you are
> on debian and can read the route manpage.  So this should at least help
> to point you in the right direction, tho I can't guarantee all the
> details are exactly correct.  This is exactly where I'd be starting were
> I in this situation, except that /were/ I in this situation, I'd probably
> already know more about VPNs as I'd have at least setup the VPN, already,
> something I haven't at this point actually ever done.  So you're ahead of
> me in that aspect. =:^)
>
>
> OK, so the route table you posted earlier was this:
>
> > werner@debian:~$ ip route
> > 0.0.0.0/1 via 10.211.38.206 dev tun0
> > default via 192.168.0.1 dev eth0  proto static
> > 10.211.38.206 dev tun0  proto kernel  scope link  src 10.211.38.205
> > 58.19.210.249 via 192.168.0.1 dev eth0
> > 128.0.0.0/1 via 10.211.38.206 dev tun0
> > 192.168.0.0/24 dev eth0  proto kernel  scope link  src 192.168.0.3
>
>
> The two link-scope routes are:
>
> 192.168.0.0/24 dev eth0 src 192.168.0.3
> 10.211.38.206 dev tun0 src 10.211.38.205
>
> The 192. route is your ethernet/LAN route, standard 192.168.0/24 (256 IP
> subnet), with the .3 address being the assigned local machine ethernet IP
> address.
>
> The 10. route is the point-to-point established over the VPN, .205 being
> the local machine tun0 address, .206 being the remote address.  The lack
> of a mask means it's point-to-point, the equivalent of a /32 or
> 255.255.255.255.  Only packets to .206 specifically, get routed that way.
>
>
> The other two routes on the raw ethernet 192.168.0/24 subnet are:
>
> default via 192.168.0.1 dev eth0
> 58.19.210.249 via 192.168.0.1 dev eth0
>
> 192.168.0.1 is obviously the local gateway, likely your router.
>
> The first route is the default route, taking anything not specifically
> routed elsewhere.  This would be your normal internet route.
>
> The 58. route is point-to-point.  Based on your VPN config, 58.19.210.249
> is the VPN-external remote host IP of your VPN, the machine to which you
> connect to establish the VPN.
>
>
> That leaves the other two routes on tun0, the VPN itself.
>
> 0.0.0.0/1 via 10.211.38.206 dev tun0
> 128.0.0.0/1 via 10.211.38.206 dev tun0
>
> The .206 address is the VPN-internal remote host on the VPN, with these
> routes using it as their gateway.
>
> The one-bit bitmask indicates that the network each of these routes is
> half the IPv4 address space, with 0.0.0.0 being the first address of the
> bottom half, while 128.0.0.0 is the first address of the upper half.
> Combined, therefore, these have the effect of overwriting the default
> route, so nothing that would have fallen back to it routes to it, as it
> is instead routed via one of these routes thru the VPN to the
> gateway .206 machine at the other end.
>
> These two routes, then, are what is causing everything to route thru the
> VPN.
>
>
> The big question is then, is this what you intended, use this VPN for all
> your not otherwise specifically routed access to the net, or not, all not
> otherwise routed traffic you still want using the default route?
>
> In your original post, you said the problem occurs when you are using a
> VPN method to access the internet.  That implies that you INTEND to route
> over the VPN everything not otherwise specifically routed, in which case
> the above routes are correct.
>
> If, however, you only want specific traffic routed over the VPN, with
> anything not specifically routed over it, routed over the previous
> default route instead, then those two routes are wrong and should be
> deleted, with a more specific replacement route for just what you intend
> to route to the VPN, created instead.
>
> As I said I'm no expert, but for this second case, based on the logged
> route commands you posted and the route manpage, and assuming you want to
> route only traffic for the 10/24 network (mask 255.255.255.0) to the VPN,
> I can guess the route delete and add commands might look like this:
>
> route del -net 0.0.0.0
> route del -net 128.0.0.0
> route add -net 10.211.38.0 netmask 255.255.255.0 gw 10.211.38.206
>
> Of course you'd adjust that netmask as appropriate for the vpn.
> If it were the entire 10/8, you'd use a netmask of 255.0.0.0.
>
>
> Back to the (almost) everything-over-the-vpn case, since that's what your
> first post implied you wanted and I've not covered it yet.  In that case,
> there's another question, what about the nntp connection?  Did you want
> it over the vpn as well, or did you want it bypassing the vpn, direct on
> the ethernet connection?
>
> If you wanted it over the VPN, then your vpn must be setup to allow nntp
> traffic, something that's apparently not the case now.  You'd have to
> contact the people who provide you the vpn connection service and ask
> them to enable it, out of scope for a post such as this.
>
> If however you want nntp to bypass the vpn despite all your other traffic
> not otherwise routed being routed thru it, then you need to setup a
> specific exception route direct over the 192. ethernet connection.
> Again, while I don't claim to be an expert, based on the information
> available, the command for that might look something like this.
>
> route add -host news.rusnet.ru gw 192.168.0.1
>
> Of course, with this option the nntp connection will be in-the-clear
> direct over the normal ethernet connection, NOT over the encrypted VPN.
> If that's what you intend, as may well be the case if only supposed to be
> an employment related vpn or the like, great, but if for instance you're
> attempting to use the VPN to avoid local ISP level censorship or tracking
> of your nntp connection, you really must talk to the vpn service provider
> and arrange for them to allow it, instead, because this option won't
> cover it.
>
> --
> Duncan - List replies preferred.   No HTML msgs.
> "Every nonfree program has a lord, a master --
> and if you use the program, he is your master."  Richard Stallman
>
>
> _______________________________________________
> Pan-users mailing list
> Pan-users@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/pan-users
>



-- 
Hongyi Zhao <hongyi.z...@gmail.com>
Xinjiang Technical Institute of Physics and Chemistry
Chinese Academy of Sciences
GnuPG DSA: 0xD108493
_______________________________________________
Pan-users mailing list
Pan-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/pan-users

Reply via email to