Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: Derive the exclude_rt from the preferred route #649

Merged

Conversation

tomc797
Copy link
Contributor

@tomc797 tomc797 commented May 6, 2023

Every exclude_rt was derived from the system's default route (ip route show default). This causes the communication to the controllers and edge routers to use the default gateway even if the system had a more preferred route for those destinations. In the worst case, the destination is unreachable from the default route, causing loss of communications.

This fix addresses this behavior by looking up the system's preferred route for the destination and then deriving the exclude_rt from that route.

A secondary benefit of this approach is that the ziti-edge-tunnel can use indirect underlays such as Speedify or Tailscale to communicate with the controllers and edge routers. One of the benefits of indirect underlays is increasing the likelihood communications passing firewalls and hard NATs.

Every exclude_rt was derived from the system's default route (which is
retrieved using ip route show default). This causes the
communication to use the default gateway even if the system had a more
preferred route for the destination. In the worst case, the destination
is unreachable from the default route, causing loss of communications.

This fix addresses this behavior by looking up the system's preferred
route for the destination and then deriving the exclude_rt from that
route.

A secondary benefit of this approach is that the ziti-edge-tunnel can use
indirect underlays such as Speedify or Tailscale to communicate with the
controllers and edge routers. One of the benefits of indirect underlays
is increasing the likelihood communications pass firewalls and hard
NATs.

Signed-off-by: Tom Carroll <[email protected]>
@tomc797 tomc797 requested a review from a team as a code owner May 6, 2023 02:19
@scareything scareything merged commit d67faef into openziti:main May 24, 2023
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

None yet

2 participants