Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Routing disabled for LAN when LAN subnet is advertised by another device. "fixed" #100

Open
DocEmmetBrown opened this issue May 29, 2023 · 8 comments

Comments

@DocEmmetBrown
Copy link

DocEmmetBrown commented May 29, 2023

This is a follow-up on #74 (comment) :

On my current install, I have one device advertising my home network (192.168.1.0/24).
When enabling Tailscale on my Qnap 451 (x86_64 model, with latest QNAP OS 5), I loose all connectivity on the LAN interface, but the Tailscale interface works.

Getting a shell on the machine, and issuing ip rule add to 192.168.1.0/24 priority 2500 lookup main as per tailscale docs "fixes" the issue.

I was able to add that command to the autorun.sh script from the QNAP to have it persistent on reboot. see this qnap doc

It looks like the --accept-routes flag is enabled, which is not what is supposed to happen by default. 🤔

Since what is used to launch the service is tailscaled and not the tailscalecommand

${QPKG_ROOT}/tailscaled --port 41641 --statedir=${QPKG_ROOT}/state --socket=/tmp/tailscale/tailscaled.sock 2> /dev/null &

I'm not sure how to disable the --accept-routes feature.

Happy to share more details on my config, and / or experiment with other settings.

Cheers,

@gzxiexl
Copy link

gzxiexl commented Jun 4, 2023

I also encountered the same problem, and I don't know how to set the default parameters

@doug-fitzmaurice-rowden

Thanks @DocEmmetBrown, this was exactly the issue we were facing, and adding the appropriate ip rule.. command has resolved it.

@talios
Copy link

talios commented Jun 13, 2023

So is this issue going to be fixed in a new release at all? I see Tailscale is now in the official QNAP AppStore - and even tho it's an older release it now triggers this issue.

@DentonGentry
Copy link
Contributor

Does turning off accepting of routes on the QNAP device resolve the routing issue?

/share/ZFS530_DATA/.qpkg/Tailscale/tailscale --socket=/tmp/tailscale/tailscaled.sock set --accept-routes=false

The path to the tailscale binary might differ on your system. ps auxw | grep tailscaled will give the full path to tailscaled, and the tailscale binary is in the same directory:

[dgentry@qnap-ts473a /]$ ps auxw | grep tailscale
 9069 dgentry     880 S   grep tailscale
11052 admin     88016 S   /share/ZFS530_DATA/.qpkg/Tailscale/tailscaled --port 41641 --statedir=/share/ZFS530_DATA/.qpkg/Tailscale/state --socket=/tmp/tailscale/tailscaled.sock
[dgentry@qnap-ts473a /]$

@talios
Copy link

talios commented Jun 14, 2023 via email

@talios
Copy link

talios commented Jun 14, 2023 via email

@Johan-Blacksquid
Copy link

Does turning off accepting of routes on the QNAP device resolve the routing issue?

/share/ZFS530_DATA/.qpkg/Tailscale/tailscale --socket=/tmp/tailscale/tailscaled.sock set --accept-routes=false

The path to the tailscale binary might differ on your system. ps auxw | grep tailscaled will give the full path to tailscaled, and the tailscale binary is in the same directory:

[dgentry@qnap-ts473a /]$ ps auxw | grep tailscale
 9069 dgentry     880 S   grep tailscale
11052 admin     88016 S   /share/ZFS530_DATA/.qpkg/Tailscale/tailscaled --port 41641 --statedir=/share/ZFS530_DATA/.qpkg/Tailscale/state --socket=/tmp/tailscale/tailscaled.sock
[dgentry@qnap-ts473a /]$

Thanks, this solved my issue.
Once Tailscale was installed on our Qnap server, devices within our LAN and not running Tailscale could not access the QNAP via the LAN IP address anymore.
With this extra line of code, they have access again.

@SiwyBoy
Copy link

SiwyBoy commented May 6, 2024

Does turning off accepting of routes on the QNAP device resolve the routing issue?

/share/ZFS530_DATA/.qpkg/Tailscale/tailscale --socket=/tmp/tailscale/tailscaled.sock set --accept-routes=false

The path to the tailscale binary might differ on your system. ps auxw | grep tailscaled will give the full path to tailscaled, and the tailscale binary is in the same directory:

[dgentry@qnap-ts473a /]$ ps auxw | grep tailscale
 9069 dgentry     880 S   grep tailscale
11052 admin     88016 S   /share/ZFS530_DATA/.qpkg/Tailscale/tailscaled --port 41641 --statedir=/share/ZFS530_DATA/.qpkg/Tailscale/state --socket=/tmp/tailscale/tailscaled.sock
[dgentry@qnap-ts473a /]$

Hi,
I was trying to follow the instruction, but I'm receiving an error message:
2024/05/06 07:31:58 tailscaled does not take non-flag arguments: ["set" "--accept-routes=false"]

When pasted this line:
ps auxw | grep tailscaled
I'm getting:

 1908 admin     74460 S   /share/CACHEDEV1_DATA/.qpkg/Tailscale/tailscaled --port 41641 --statedir=/share/CACHEDEV1_DATA/.qpkg/Tailscale/state --socket=/tmp/tailscale/tailscaled.sock
 4712 artur.ad    456 S   grep tailscaled``

Am I missing something?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants