Hi Binarus,

it is better to post on Wireshark GitLab BugTracker
but in your case, i think it is a capture issue coming from npcap and it
will be better to post on npcap github issue
(What the release of npcap ?)

Cheers

On Mon, Oct 5, 2020 at 3:06 PM Binarus <li...@binarus.de> wrote:

> Dear Wireshark developers,
>
> at first, I'd like to thank you for your great work! Wireshark helped me
> analyze and solve problems a zillion of times, and it has never crashed
> or was unreliable.
>
> However, I believe that I now have found a bug. If you need more
> information than I provide below, I'll happily assist. And please bear
> in mind that I am not an expert in this field, so I may have missed
> something.
>
> To clarify and to save time, please note the following:
>
> - This is NOT about Wireshark not capturing correctly
> - This is NOT about Wireshark crashing or being unstable
>
> This IS solely about Wireshark blocking traffic through a VPN
> connection. Having said this:
>
> O/S
> ---
> Windows 10 Enterprise X64 v1909, patched up-to-date
>
> Wireshark version
> -----------------
> 3.2.7 (v3.2.7-0-gfb6522d84a3a)
>
> Compiled (64-bit) with Qt 5.12.9, with WinPcap SDK (WpdPack) 4.1.2, with
> GLib 2.52.3, with zlib 1.2.11, with SMI 0.4.8, with c-ares 1.15.0, with
> Lua 5.2.4, with GnuTLS 3.6.3 and PKCS #11 support, with Gcrypt 1.8.3,
> with MIT Kerberos, with MaxMind DB resolver, with nghttp2 1.39.2, with
> brotli, with LZ4, with Zstandard, with Snappy, with libxml2 2.9.9, with
> QtMultimedia, with automatic updates using WinSparkle 0.5.7, with
> AirPcap, with SpeexDSP (using bundled resampler), with SBC, with
> SpanDSP, with bcg729.
>
> Running on 64-bit Windows 10 (1909), build 18363, with Intel(R) Xeon(R)
> CPU E3-1230 v5 @ 3.40GHz (with SSE4.2), with 16277 MB of physical
> memory, with locale German_Germany.1252, with light display mode,
> without HiDPI, with Npcap version 0.9997, based on libpcap version
> 1.9.1, with GnuTLS 3.6.3, with Gcrypt 1.8.3, with brotli 1.0.2, without
> AirPcap, binary plugins supported (19 loaded).
>
> Built using Microsoft Visual Studio 2019 (VC++ 14.27, build 29111).
>
> I have recently downloaded that version (I did not compile myself).
>
> Problem
> -------
> When I start Wireshark and start capturing at all interfaces (regardless
> whether or not there is a capturing filter active and regardless of what
> that filter actually is), the traffic through VPN connections is
> blocked. As soon as I stop capturing in Wireshark, the VPN tunnel works
> again (I don't need to close Wireshark, I just need to stop capturing
> for that).
>
> Exact steps to reproduce
> ------------------------
>
> 1) The Windows client shall use a LAN connection with IP 192.168.20.100,
> and its subnet shall be 192.168.20/24, and shall be connected to the
> internet by a common SOHO router with NAT.
>
> 2) Using the Windows UI, create a VPN connection with name "Test", using
> the native Windows IPSec client, using IKEv2, using machine
> certificates, MOBIKE disabled, encryption level "Require", credential
> storing disabled.
>
> 3) Fine-tune that VPN connection using the following Powershell commands
> as Administrator:
>
> Set-VpnConnection -Name Test -AllUserConnection -ServerName
> remote.vpn.gateway -TunnelType Ikev2 -AuthenticationMethod
> MachineCertificate -EncryptionLevel Required -SplitTunneling $true
>
> Set-VpnConnectionIPsecConfiguration -ConnectionName Test
> -AuthenticationTransformConstants GCMAES256 -CipherTransformConstants
> GCMAES256 -EncryptionMethod GCMAES256 -IntegrityCheckMethod SHA384
> -PfsGroup PFS2048 -DHGroup Group14 -AllUserConnection
>
> 4) Install an appropriate machine certificate and the CA certificate
> (which has signed the remote gateway's certificate) in Windows.
>
> 5) Configure the remote gateway so that it accepts the connection when
> the Windows client establishes the VPN created in the previous steps.
> Furthermore, make sure that the following conditions are met:
>
> - The remote gateway (besides its public IP address) has the IP address
> 192.168.0.250, and it is in the local subnet 192.168.0.0/24.
>
> - Furthermore, it uses IKE-CFG to assign an IP address to the Windows
> client when the latter establishes a VPN connection. The IP address it
> assigns shall be 192.168.3.1
>
> - The remote gateway routes traffic between 192.168.3.1 and 192.68.0.0,
> and the remote gateway's firewall (if any) lets this traffic pass.
>
> 6) In Windows, establish the VPN connection, and verify that (after
> connecting successfully) there is a new network interface with IP
> 192.168.3.1 (if it isn't, the VPN is not set up correctly, and this must
> be sorted out before proceeding), e.g. by typing ipconfig /all in a
> command prompt.
>
> 7) To tell Windows how it can reach the subnet behind the remote VPN
> gateway, add the appropriate route by giving the following command in a
> command prompt with administrative permissions:
>
> route add 192.168.0.0 mask 255.255.255.0 192.168.3.1
>
> Check whether Windows now can reach the remote subnet, e.g. via ping:
>
> ping 192.168.0.10
>
> (provided that 192.168.0.10 is reachable in the remote subnet and does
> not block ICMP from other subnets, this should work; if it doesn't, the
> VPN is not set up correctly, and this must be sorted out before
> proceeding).
>
> 8) On the Windows client, start Wireshark and let it capture on all
> interfaces. Repeat the ping command from above and note that it does not
> work any more (it produces timeouts, no reply comes back).
>
> 9) Do not close Wireshark, but stop capturing. Repeat the ping command
> from above and note that it works again (no more timeouts, reply comes
> back as expected).
>
> To confirm that the problem can be reproduced, start and stop capturing
> in Wireshark as often as you like, and each time check whether the ping
> command from above works. Confirm that it does not work while Wireshark
> is capturing, and that it does work while Wireshark is not capturing.
>
>
> I know that my setup may be somewhat exotic (normally, you let a VPN
> gateway assign IP addresses to the client which are from its internal
> subnet so that you don't need to add a route on the client). However, I
> believe that this should work and that Wireshark blocking traffic
> through the VPN channel is a bug.
>
> Could you please let me know what you think about that and whether I can
> assist in solving the problem?
>
> Thank you very much, and best regards,
>
> Binarus
> ___________________________________________________________________________
> Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
> Archives:    https://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
>              mailto:wireshark-dev-requ...@wireshark.org
> ?subject=unsubscribe
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <wireshark-dev@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-dev
             mailto:wireshark-dev-requ...@wireshark.org?subject=unsubscribe

Reply via email to