When third-party VPN software (e.g., OpenVPN) installs WFP block filters via block-outside-dns, all DNS traffic to non-tunnel interfaces is blocked — including DNS to 127.0.0.1 (ctrld's NRPT target). This breaks DNS mode interception because the NRPT catch-all rule routes queries to loopback, but WFP blocks the connection before it reaches ctrld's listener. Fix: after exhausting all NRPT recovery attempts, activate a minimal WFP session with "hard permit" filters (FWPM_FILTER_FLAG_CLEAR_ACTION_RIGHT) for DNS to localhost in a max-priority sublayer (weight 0xFFFF). This overrides the VPN's block for loopback DNS only, while preserving the VPN's DNS leak protection for all other (non-loopback) DNS traffic. The loopback protect is: - Only activated when NRPT probes fail (not preemptively) - Harmless when no conflicting WFP blocks exist (permit-only, no blocks) - Persistent until ctrld shutdown (survives VPN reconnect cycles) - Cleaned up by the existing cleanupWFPFilters path on shutdown
4.4 KiB
Known Issues
This document outlines known issues with ctrld and their current status, workarounds, and recommendations.
macOS (Darwin) Issues
Self-Upgrade Issue on Darwin 15.5
Issue: ctrld self-upgrading functionality may not work on macOS Darwin 15.5.
Status: Under investigation
Description: Users on macOS Darwin 15.5 may experience issues when ctrld attempts to perform automatic self-upgrades. The upgrade process would be triggered, but ctrld won't be upgraded.
Workarounds:
- Recommended: Upgrade your macOS system to Darwin 15.6 or later, which has been tested and verified to work correctly with ctrld self-upgrade functionality.
- Alternative: Run
ctrld upgrade proddirectly to manually upgrade ctrld to the latest version on Darwin 15.5.
Affected Versions: ctrld v1.4.2 and later on macOS Darwin 15.5
Last Updated: 05/09/2025
Merlin Issues
Daemon Crashing on Ctrl+C
Issue: ctrld daemon terminates unexpectedly after stopping a log tailing command. This typically occurs when running the daemon and the log viewer within the same SSH session on ASUSWRT-Merlin routers.
Description
The issue is caused by Signal Propagation within a shared Process Group (PGID).
Steps to reproduce:
- You start the daemon manually:
ctrld start --cd=<uid>. - You view internal logs in the same terminal:
ctrld log tail. - You press
Ctrl+Cto stop viewing logs. - The
ctrlddaemon service stops immediately along with the log command.
When you execute commands sequentially in a single interactive SSH session on Merlin, the shell often assigns them to the same Process Group. In Linux, the SIGINT signal (triggered by Ctrl+C) is not just sent to the foreground application, but is frequently propagated to every process belonging to that specific process group.
Because the ctrld daemon remains "attached" to the terminal session's process group, it "hears" the interrupt signal intended for the log tail command and shuts down.
Workarounds:
To isolate the signals, avoid running the log viewer in the same window as the daemon:
- Window A: Start the daemon and leave it running.
- Window B: Open a new SSH connection to run
ctrld log tail. Because Window B has a different Session ID and Process Group ID, pressingCtrl+Cin Window B will not affect the process in Window A.
Windows Issues
VPN block-outside-dns Breaks DNS When Using ctrld in DNS Mode
Issue: VPN software that uses OpenVPN's block-outside-dns directive installs WFP (Windows Filtering Platform) block filters that prevent DNS queries from reaching ctrld's loopback listener.
Status: Fixed in v1.5.1
Description: When a VPN connects with block-outside-dns enabled, OpenVPN adds WFP filters that block all DNS traffic to non-tunnel interfaces — including loopback (127.0.0.1). Since ctrld's NRPT catch-all rule routes DNS through the Windows DNS Client to 127.0.0.1:53, the WFP block filters prevent DNS Client from reaching ctrld, causing all DNS queries to time out.
This affects any VPN client that implements block-outside-dns via WFP, including:
- OpenVPN GUI (community)
- Securepoint SSL VPN
- Any OpenVPN-based client that honors the
block-outside-dnspush directive
Fix: ctrld now proactively adds WFP "hard permit" filters for DNS to localhost at startup. These use FWPM_FILTER_FLAG_CLEAR_ACTION_RIGHT to override block decisions from any other WFP sublayer, ensuring the NRPT → loopback path is always available regardless of VPN state. See docs/dns-intercept-mode.md for technical details.
Affected Versions: ctrld ≤ v1.5.0 in dns intercept mode on Windows
Last Updated: 04/28/2026
Contributing to Known Issues
If you encounter an issue not listed here, please:
- Check the GitHub Issues to see if it's already reported
- If not reported, create a new issue with:
- Detailed description of the problem
- Steps to reproduce
- Expected vs actual behavior
- System information (OS, version, architecture)
- ctrld version
Issue Status Legend
- Under investigation: Issue is confirmed and being analyzed
- Workaround available: Temporary solution exists while permanent fix is developed
- Fixed: Issue has been resolved in a specific version
- Won't fix: Issue is acknowledged but will not be addressed due to technical limitations or design decisions