You are not logged in.

#1 2020-01-13 16:31:20

samuellando
Member
From: Montreal
Registered: 2020-01-13
Posts: 4
Website

[Solved] Problems with networking after reboot.

I've had the problem for a few weeks now.

After rebooting I cant connect to any website.

Running

$ ping www.google.com

gives the following output:

PING www.google.com (172.217.13.164) 56(84) bytes of data.
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
^C
--- www.google.com ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 2033ms

However after running

$ sudo ufw reload

everything works fine.

I've tried poking around for a solution to this problem, however I don't know much about the networking side of things.

Last edited by samuellando (2020-01-14 19:44:55)

Offline

#2 2020-01-14 16:28:23

Head_on_a_Stick
Member
From: London
Registered: 2014-02-20
Posts: 7,680
Website

Re: [Solved] Problems with networking after reboot.

You should explain how you are connecting and post your ufw configuration. Listing the relevant hardware also seems appropriate.

Do you still experience the problem if ufw is disabled? What does the systemd journal have to say about it?

Offline

#3 2020-01-14 19:01:47

samuellando
Member
From: Montreal
Registered: 2020-01-13
Posts: 4
Website

Re: [Solved] Problems with networking after reboot.

Head_on_a_Stick wrote:

You should explain how you are connecting and post your ufw configuration. Listing the relevant hardware also seems appropriate.

Do you still experience the problem if ufw is disabled? What does the systemd journal have to say about it?

Thanks for the reply,

I am connecting over wifi with netctl. I am able to connect to the wifi right after startup, but no websites work and running ping gives the permission denied message as seen in my original post.

The problem persists with ufw enabled or disabled at startup. And once I run ufw reload, internet works.

I did not configure ufw and running

ufw status

just outputs

Status: active

Last edited by samuellando (2020-01-14 19:03:05)

Offline

#4 2020-01-14 19:19:53

Head_on_a_Stick
Member
From: London
Registered: 2014-02-20
Posts: 7,680
Website

Re: [Solved] Problems with networking after reboot.

I think we need to see the journal contents so run this command in a spare terminal immediately after boot (when you can't connect):

journalctl --follow

Then restart ufw and see what new messages are printed.

EDIT: and I suppose we should also check for conflicting services:

systemctl list-unit-files --state=enabled

Last edited by Head_on_a_Stick (2020-01-14 19:23:51)

Offline

#5 2020-01-14 19:37:40

samuellando
Member
From: Montreal
Registered: 2020-01-13
Posts: 4
Website

Re: [Solved] Problems with networking after reboot.

Head_on_a_Stick wrote:

I think we need to see the journal contents so run this command in a spare terminal immediately after boot (when you can't connect):

journalctl --follow

Then restart ufw and see what new messages are printed.

EDIT: and I suppose we should also check for conflicting services:

systemctl list-unit-files --state=enabled

Doing it immediately after a reboot, and running ufw reload, journalctl gives:

-- Logs begin at Wed 2019-02-27 11:34:43 EST. --
Jan 14 14:29:47 core kernel: kauditd_printk_skb: 1 callbacks suppressed
Jan 14 14:29:47 core kernel: audit: type=1100 audit(1579030187.091:46): pid=4233 uid=1000 auid=1000 ses=1 msg='op=PAM:authentication grantors=pam_unix,pam_permit acct="sam" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
Jan 14 14:29:47 core kernel: audit: type=1101 audit(1579030187.091:47): pid=4233 uid=1000 auid=1000 ses=1 msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="sam" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
Jan 14 14:29:47 core kernel: audit: type=1110 audit(1579030187.091:48): pid=4233 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
Jan 14 14:29:47 core kernel: audit: type=1105 audit(1579030187.096:49): pid=4233 uid=0 auid=1000 ses=1 msg='op=PAM:session_open grantors=pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
Jan 14 14:29:47 core audit[4233]: USER_ACCT pid=4233 uid=1000 auid=1000 ses=1 msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="sam" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
Jan 14 14:29:47 core audit[4233]: CRED_REFR pid=4233 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
Jan 14 14:29:47 core audit[4233]: USER_START pid=4233 uid=0 auid=1000 ses=1 msg='op=PAM:session_open grantors=pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
Jan 14 14:29:47 core sudo[4233]:      sam : TTY=pts/0 ; PWD=/home/sam ; USER=root ; COMMAND=/usr/bin/journalctl --follow
Jan 14 14:29:47 core sudo[4233]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan 14 14:29:56 core audit[5824]: USER_AUTH pid=5824 uid=1000 auid=1000 ses=1 msg='op=PAM:authentication grantors=pam_unix,pam_permit acct="sam" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core kernel: audit: type=1100 audit(1579030196.585:50): pid=5824 uid=1000 auid=1000 ses=1 msg='op=PAM:authentication grantors=pam_unix,pam_permit acct="sam" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core kernel: audit: type=1101 audit(1579030196.585:51): pid=5824 uid=1000 auid=1000 ses=1 msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="sam" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core kernel: audit: type=1110 audit(1579030196.586:52): pid=5824 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core kernel: audit: type=1105 audit(1579030196.590:53): pid=5824 uid=0 auid=1000 ses=1 msg='op=PAM:session_open grantors=pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core audit[5824]: USER_ACCT pid=5824 uid=1000 auid=1000 ses=1 msg='op=PAM:accounting grantors=pam_unix,pam_permit,pam_time acct="sam" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core audit[5824]: CRED_REFR pid=5824 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core audit[5824]: USER_START pid=5824 uid=0 auid=1000 ses=1 msg='op=PAM:session_open grantors=pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:56 core sudo[5824]:      sam : TTY=pts/1 ; PWD=/home/sam ; USER=root ; COMMAND=/usr/bin/ufw reload
Jan 14 14:29:56 core sudo[5824]: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan 14 14:29:56 core audit: NETFILTER_CFG table=filter family=10 entries=0
Jan 14 14:29:56 core kernel: audit: type=1325 audit(1579030196.871:54): table=filter family=10 entries=0
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=10
Jan 14 14:29:57 core kernel: audit: type=1325 audit(1579030197.004:55): table=filter family=2 entries=10
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=10
Jan 14 14:29:57 core kernel: audit: type=1325 audit(1579030197.006:56): table=filter family=2 entries=10
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=10
Jan 14 14:29:57 core kernel: audit: type=1325 audit(1579030197.008:57): table=filter family=2 entries=10
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=4
Jan 14 14:29:57 core kernel: audit: type=1325 audit(1579030197.143:58): table=filter family=10 entries=4
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=4
Jan 14 14:29:57 core kernel: audit: type=1325 audit(1579030197.145:59): table=filter family=10 entries=4
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=4
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=10
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=10
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=64
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=66
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=70
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=79
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=105
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=112
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=128
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=136
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=4
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=4
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=58
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=60
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=64
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=73
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=138
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=144
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=160
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=168
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=141
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=142
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=143
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=141
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=173
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=174
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=175
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=173
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=138
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=138
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=138
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=138
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=137
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=170
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=170
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=170
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=170
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=169
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=137
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=135
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=135
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=134
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=169
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=167
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=167
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=166
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=134
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=135
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=166
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=167
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=136
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=137
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=138
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=168
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=169
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=170
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=139
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=2 entries=138
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=171
Jan 14 14:29:57 core audit: NETFILTER_CFG table=filter family=10 entries=170
Jan 14 14:29:57 core sudo[5824]: pam_unix(sudo:session): session closed for user root
Jan 14 14:29:57 core audit[5824]: USER_END pid=5824 uid=0 auid=1000 ses=1 msg='op=PAM:session_close grantors=pam_limits,pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:29:57 core audit[5824]: CRED_DISP pid=5824 uid=0 auid=1000 ses=1 msg='op=PAM:setcred grantors=pam_unix,pam_permit acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/1 res=success'
Jan 14 14:30:01 core audit[7375]: USER_ACCT pid=7375 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_time acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core kernel: kauditd_printk_skb: 79 callbacks suppressed
Jan 14 14:30:01 core kernel: audit: type=1101 audit(1579030201.979:139): pid=7375 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_time acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core kernel: audit: type=1103 audit(1579030201.980:140): pid=7375 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_unix,pam_env acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core kernel: audit: type=1006 audit(1579030201.980:141): pid=7375 uid=0 old-auid=4294967295 auid=1000 tty=(none) old-ses=4294967295 ses=3 res=1
Jan 14 14:30:01 core kernel: audit: type=1105 audit(1579030201.989:142): pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:session_open grantors=pam_loginuid,pam_limits,pam_unix acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core kernel: audit: type=1110 audit(1579030201.991:143): pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:setcred grantors=pam_unix,pam_env acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core audit[7375]: CRED_ACQ pid=7375 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_unix,pam_env acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core audit[7375]: USER_START pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:session_open grantors=pam_loginuid,pam_limits,pam_unix acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core audit[7375]: CRED_REFR pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:setcred grantors=pam_unix,pam_env acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core crond[7375]: pam_unix(crond:session): session opened for user sam by (uid=0)
Jan 14 14:30:01 core CROND[7376]: (sam) CMD (export DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1000/bus; export DISPLAY=:0; . $HOME/.profile; /usr/bin/mailsync)
Jan 14 14:30:01 core CROND[7375]: (sam) CMDOUT (/bin/sh: /home/sam/.profile: No such file or directory)
Jan 14 14:30:01 core audit[7375]: CRED_DISP pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:setcred grantors=pam_unix,pam_env acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:01 core audit[7375]: USER_END pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:session_close grantors=pam_loginuid,pam_limits,pam_unix acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:02 core CROND[7375]: pam_unix(crond:session): session closed for user sam
Jan 14 14:30:02 core kernel: audit: type=1104 audit(1579030201.998:144): pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:setcred grantors=pam_unix,pam_env acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'
Jan 14 14:30:02 core kernel: audit: type=1106 audit(1579030201.998:145): pid=7375 uid=0 auid=1000 ses=3 msg='op=PAM:session_close grantors=pam_loginuid,pam_limits,pam_unix acct="sam" exe="/usr/bin/crond" hostname=? addr=? terminal=cron res=success'

and

systemctl list-unit-files --state=enabled

gives

UNIT FILE                          STATE
org.cups.cupsd.path                enabled
autovt@.service                    enabled
avahi-daemon.service               enabled
cronie.service                     enabled
dbus-org.freedesktop.Avahi.service enabled
getty@.service                     enabled
nordvpnd.service                   enabled
org.cups.cupsd.service             enabled
avahi-daemon.socket                enabled
org.cups.cupsd.socket              enabled
remote-fs.target                   enabled

11 unit files listed.

Offline

#6 2020-01-14 19:42:53

samuellando
Member
From: Montreal
Registered: 2020-01-13
Posts: 4
Website

Re: [Solved] Problems with networking after reboot.

Running

systemctl disable nordvpnd

fixed the problem. Thanks so much for the help!

Offline

#7 2020-01-14 19:44:07

Head_on_a_Stick
Member
From: London
Registered: 2014-02-20
Posts: 7,680
Website

Re: [Solved] Problems with networking after reboot.

I can't see anything relevant in the journal but I am very tired from $DAY_JOB so I may be missing something.

The enabled units make me suspect your VPN but as I've never used such a thing this may be pure superstition on my part.

Have you enabled netctl or do you just start it manually?

EDIT: ha! Superstition wins! big_smile

Last edited by Head_on_a_Stick (2020-01-14 19:44:54)

Offline

Board footer

Powered by FluxBB