We may want to consider other backend for web proxy functionality
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Feb 25 2018
Deprecate that function, and push resources to building on Core routing and Code stability
That would be great!
In parallel the XML file for the config nodes can be created. I‘d keep the nodes as they are right now to kot break running setups.
Agree,
@c-po what will be best way to start with that,
i can collect vyos settings a map them to pdns config options, not that much there actually
See T546 ("service dns forwarding doman localdomain server" entry doesn't allow IPv6 address). This one is resolved.
Functionality should be implemented via the new style vyos-1x interface.
Impossible to implement
@c-po that sucks as this is huge problem for me (but not only)
I will create separate request for powerdns-recursor implementation and we likely need to move that functionality there
@dmbaturin @UnicronNL for what we use dnsmasq apart from dns forwarding?
Feb 24 2018
Checking the manpage @ http://www.thekelleys.org.uk/dnsmasq/docs/dnsmasq-man.html gives us:
Feb 23 2018
if we setup the volume as working dir inside the container the mknod function during the make iso process will fail if the docker host is MacOs or Windows.
The error is "mknod: Function not implemented " and is related to how docker engine is implemented to run on Mac and Windows systems
Feb 21 2018
Perfect. I will update the Readme and push again the change.
And you don't need sudo because the container is running as root. Why do you want a text editor in a docker image?
The vyos-build repo makes sense. We might want to move our comments at the top of the Dockerfile to a readme since they are runtime related and not build related. It might also make sense to add your comments on why to include each package in the Dockerfile as well.
I've created this pull request for Dockerfile to vyos-build repository
https://github.com/vyos/vyos-build/pull/15/commits/428c73d96ff745ba61ba834d9d2a42d5dc8ed5cd
@dsummers build triggered, please verify.
cpo@CR2# set service dns forwarding domain foo.com server
Possible completions:
<x.x.x.x> Domain Name Server (DNS) address
<h:h:h:h:h:h:h:h>
Domain Name Server (DNS) addressthank you for this.
I would suggest to install more dependencies using this docker file. The complete list of what I think we should use is:
squashfs-tools # Required for squashfs file system git # Required, for cloning the source autoconf # Required, for generating build scripts dpkg-dev # Required, used in build scripts live-helper # Required, for ISO build syslinux # Required, for ISO build genisoimage # Required, for ISO build make # Required, for ISO build lsb-release # Required, used by configure script ssh # Optional, for cloning over SSH sudo # Optional, ISO build requires root privileges fakechroot # Required, for ISO build devscripts # Optional, for building submodules (kernel etc) kernel-package # Optional, for building the kernel libtool # Optional, for building certain packages (eg vyatta-op-vpn) libglib2.0-dev # Optional, for building vyatta-cfg libboost-filesystem-dev # Optional, for building vyatta-cfg libapt-pkg-dev # Optional, for building vyatta-cfg flex # Optional, for building vyatta-cfg bison # Optional, for building vyatta-cfg libperl-dev # Optional, for building vyatta-cfg libnfnetlink-dev # Optional, for building vyatta-cfg-vpn vim # Optional, vim, vi, nano or other text editor
Pull request: https://github.com/vyos/vyatta-cfg-vpn/pull/18
I've attached a docker file. It must be run with the --privileged flag for chroot to work.
Feb 20 2018
Can you look into that
I've created pull request https://github.com/vyos/vyos-build/pull/15 to solve this issue
Done for all practical purposes. Everything else will deserve its own task.
It's done for OpenVPN. We can later add IPsec as a sub-task.
Feb 19 2018
The use case this patch solve is the following:
-we have a firewall with multiple rules set
-the firewall is mapped to an interface
-we want to remove one/or multiple rules from the rule chain (this is not possible using current VyOs version as long as the filter is mapped to an interface)
I created this patch for this issue https://github.com/vyos/vyatta-cfg-firewall/pull/6
Feb 18 2018
the file used for the package "version" is the changelog file.
I seem to be wrong with my initial statement where to set the version. The file debian/vyatta-wireless/DEBIAN/control is not even in version control and I can't seem to find a hint on where this version string 0.3.41+vyos2+current1 really comes from.
@dmbaturin @UnicronNL can you comment on this
Feb 16 2018
I'll look into this
$ sudo iptables-save # Generated by iptables-save v1.4.21 on Fri Feb 16 12:02:44 2018 *nat :PREROUTING ACCEPT [455:68437] :INPUT ACCEPT [453:68365] :OUTPUT ACCEPT [28690:1721678] :POSTROUTING ACCEPT [28690:1721678] :VYATTA_PRE_DNAT_HOOK - [0:0] :VYATTA_PRE_SNAT_HOOK - [0:0] -A PREROUTING -j VYATTA_PRE_DNAT_HOOK -A PREROUTING -s X.X.128.0/19 -d X.X.169.254/32 -i eth3 -p tcp -m tcp --dport 80 -m comment --comment DST-NAT-5 -j DNAT --to-destination X.X.128.183 -A POSTROUTING -j VYATTA_PRE_SNAT_HOOK -A POSTROUTING -s X.X.128.0/19 ! -d X.X.128.0/19 -o eth1 -m comment --comment SRC-NAT-50 -j MASQUERADE -A VYATTA_PRE_DNAT_HOOK -j RETURN -A VYATTA_PRE_SNAT_HOOK -j RETURN COMMIT # Completed on Fri Feb 16 12:02:44 2018 # Generated by iptables-save v1.4.21 on Fri Feb 16 12:02:44 2018 *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] :LAN-INBOUND - [0:0] :LOCAL - [0:0] :LOCAL-SYNC - [0:0] :LOCAL_NAS - [0:0] :NAS - [0:0] :VYATTA_FW_IN_HOOK - [0:0] :VYATTA_FW_LOCAL_HOOK - [0:0] :VYATTA_FW_OUT_HOOK - [0:0] :VYATTA_POST_FW_FWD_HOOK - [0:0] :VYATTA_POST_FW_IN_HOOK - [0:0] :VYATTA_POST_FW_OUT_HOOK - [0:0] :VYATTA_PRE_FW_FWD_HOOK - [0:0] :VYATTA_PRE_FW_IN_HOOK - [0:0] :VYATTA_PRE_FW_OUT_HOOK - [0:0] :VYATTA_STATE_POLICY_FWD_HOOK - [0:0] :VYATTA_STATE_POLICY_IN_HOOK - [0:0] :VYATTA_STATE_POLICY_OUT_HOOK - [0:0] :WAN-INBOUND - [0:0] -A INPUT -j VYATTA_PRE_FW_IN_HOOK -A INPUT -j VYATTA_FW_LOCAL_HOOK -A INPUT -j VYATTA_POST_FW_IN_HOOK -A FORWARD -j VYATTA_PRE_FW_FWD_HOOK -A FORWARD -j VYATTA_FW_IN_HOOK -A FORWARD -j VYATTA_FW_OUT_HOOK -A FORWARD -j VYATTA_POST_FW_FWD_HOOK -A OUTPUT -j VYATTA_PRE_FW_OUT_HOOK -A OUTPUT -j VYATTA_POST_FW_OUT_HOOK -A LAN-INBOUND -m comment --comment LAN-INBOUND-1 -m set ! --match-set PUBLIC src -j DROP -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-1015 -m set --match-set PUBLIC src -m tcp --dport 67 -m set --match-set DHCP-SERVERS dst -j RETURN -A LAN-INBOUND -p udp -m comment --comment LAN-INBOUND-1015 -m set --match-set PUBLIC src -m udp --dport 67 -m set --match-set DHCP-SERVERS dst -j RETURN -A LAN-INBOUND -d X.X.136.198/32 -p tcp -m comment --comment LAN-INBOUND-1020 -m set --match-set NAGIOS_PROBES src -m tcp --dport 5667 -j RETURN -A LAN-INBOUND -m comment --comment LAN-INBOUND-1030 -m set --match-set F5-NLB src -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-1200 -m set --match-set PUBLIC src -m iprange --dst-range X.X.131.16-X.X.131.17 -m tcp --dport 88 -j RETURN -A LAN-INBOUND -p udp -m comment --comment LAN-INBOUND-1200 -m set --match-set PUBLIC src -m iprange --dst-range X.X.131.16-X.X.131.17 -m udp --dport 88 -j RETURN -A LAN-INBOUND -m comment --comment LAN-INBOUND-1201 -m set --match-set PUBLIC src -m iprange --dst-range X.X.131.253-X.X.131.254 -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-1220 -m set --match-set DT_SMTP_BLOCKED src -m tcp --dport 25 -j DROP -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2000 -m tcp --dport 22 -m set --match-set G-22-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2001 -m tcp --dport 3389 -m set --match-set G-3389-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2002 -m tcp --dport 80 -m set --match-set G-80-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2003 -m tcp --dport 443 -m set --match-set G-443-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2004 -m tcp --dport 53 -m set --match-set G-53-TCP dst -j RETURN -A LAN-INBOUND -p udp -m comment --comment LAN-INBOUND-2005 -m udp --dport 53 -m set --match-set G-53-UDP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2006 -m tcp --dport 25 -m set --match-set G-25-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2007 -m tcp --dport 143 -m set --match-set G-143-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2008 -m tcp --dport 110 -m set --match-set G-110-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2009 -m tcp --dport 1433 -m set --match-set G-1433-TCP dst -j RETURN -A LAN-INBOUND -p udp -m comment --comment LAN-INBOUND-2010 -m udp --dport 1433 -m set --match-set G-1433-UDP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2011 -m tcp --dport 3306 -m set --match-set G-3306-TCP dst -j RETURN -A LAN-INBOUND -p udp -m comment --comment LAN-INBOUND-2012 -m udp --dport 3306 -m set --match-set G-3306-UDP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2013 -m tcp --dport 20 -m set --match-set G-20-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2014 -m tcp --dport 21 -m set --match-set G-21-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2015 -m tcp --dport 465 -m set --match-set G-465-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2016 -m tcp --dport 587 -m set --match-set G-587-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2017 -m tcp --dport 993 -m set --match-set G-993-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2018 -m tcp --dport 995 -m set --match-set G-995-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2019 -m tcp --dport 8080 -m set --match-set G-8080-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2020 -m tcp --dport 8443 -m set --match-set G-8443-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2021 -m tcp --dport 10000 -m set --match-set G-10000-TCP dst -j RETURN -A LAN-INBOUND -p tcp -m comment --comment LAN-INBOUND-2022 -m tcp --dport 8447 -m set --match-set G-8447-TCP dst -j RETURN -A LAN-INBOUND -m comment --comment LAN-INBOUND-2040 -m set --match-set G-ALL_OPEN dst -j RETURN -A LAN-INBOUND -p icmp -m comment --comment LAN-INBOUND-2050 -m set --match-set G-ICMP dst -j RETURN -A LAN-INBOUND -m comment --comment LAN-INBOUND-2060 -m set --match-set DT_BLOCKED src -j DROP -A LAN-INBOUND -m comment --comment LAN-INBOUND-8000 -m set --match-set PUBLIC src -m set ! --match-set PUBLIC dst -j RETURN -A LAN-INBOUND -m comment --comment "LAN-INBOUND-10000 default-action drop" -j DROP -A LOCAL -d X.X.254.1/32 -p icmp -m comment --comment LOCAL-2 -m set --match-set PUBLIC src -j RETURN -A LOCAL -d X.X.254.1/32 -p tcp -m comment --comment LOCAL-3 -m set --match-set PUBLIC src -m tcp --dport 53 -j RETURN -A LOCAL -d X.X.254.1/32 -p udp -m comment --comment LOCAL-3 -m set --match-set PUBLIC src -m udp --dport 53 -j RETURN -A LOCAL -s X.X.137.28/30 -d X.X.137.28/30 -m comment --comment LOCAL-4 -j RETURN -A LOCAL -m comment --comment LOCAL-10 -m set --match-set LAN_ADDRESSES src -m set --match-set LAN_ADDRESSES dst -j RETURN -A LOCAL -m comment --comment LOCAL-12 -m set --match-set F5-NLB src -j RETURN -A LOCAL -m comment --comment "LOCAL-10000 default-action drop" -j DROP -A LOCAL-SYNC -s X.X.137.28/30 -d X.X.137.28/30 -m comment --comment LOCAL-SYNC-10 -j RETURN -A LOCAL-SYNC -m comment --comment "LOCAL-SYNC-10000 default-action drop" -j DROP -A LOCAL_NAS -m comment --comment "LOCAL_NAS-10000 default-action drop" -j DROP -A NAS -m comment --comment "NAS-10000 default-action drop" -j DROP -A VYATTA_FW_IN_HOOK -i eth1 -j WAN-INBOUND -A VYATTA_FW_IN_HOOK -i eth3 -j LAN-INBOUND -A VYATTA_FW_LOCAL_HOOK -i eth2 -j LOCAL-SYNC -A VYATTA_FW_LOCAL_HOOK -i eth3 -j LOCAL -A VYATTA_POST_FW_FWD_HOOK -j ACCEPT -A VYATTA_POST_FW_IN_HOOK -j ACCEPT -A VYATTA_POST_FW_OUT_HOOK -j ACCEPT -A VYATTA_PRE_FW_FWD_HOOK -j VYATTA_STATE_POLICY_FWD_HOOK -A VYATTA_PRE_FW_FWD_HOOK -j RETURN -A VYATTA_PRE_FW_IN_HOOK -j VYATTA_STATE_POLICY_IN_HOOK -A VYATTA_PRE_FW_IN_HOOK -j RETURN -A VYATTA_PRE_FW_OUT_HOOK -j VYATTA_STATE_POLICY_OUT_HOOK -A VYATTA_PRE_FW_OUT_HOOK -j RETURN -A VYATTA_STATE_POLICY_FWD_HOOK -m state --state INVALID -j DROP -A VYATTA_STATE_POLICY_FWD_HOOK -m state --state ESTABLISHED -j VYATTA_POST_FW_FWD_HOOK -A VYATTA_STATE_POLICY_FWD_HOOK -m state --state RELATED -j VYATTA_POST_FW_FWD_HOOK -A VYATTA_STATE_POLICY_FWD_HOOK -j RETURN -A VYATTA_STATE_POLICY_IN_HOOK -m state --state INVALID -j DROP -A VYATTA_STATE_POLICY_IN_HOOK -m state --state ESTABLISHED -j VYATTA_POST_FW_IN_HOOK -A VYATTA_STATE_POLICY_IN_HOOK -m state --state RELATED -j VYATTA_POST_FW_IN_HOOK -A VYATTA_STATE_POLICY_IN_HOOK -j RETURN -A VYATTA_STATE_POLICY_OUT_HOOK -m state --state INVALID -j DROP -A VYATTA_STATE_POLICY_OUT_HOOK -m state --state ESTABLISHED -j VYATTA_POST_FW_OUT_HOOK -A VYATTA_STATE_POLICY_OUT_HOOK -m state --state RELATED -j VYATTA_POST_FW_OUT_HOOK -A VYATTA_STATE_POLICY_OUT_HOOK -j RETURN -A WAN-INBOUND -m comment --comment WAN-INBOUND-1 -m set --match-set REDES_PUESTOS src -m set --match-set PUBLIC dst -j RETURN -A WAN-INBOUND -m comment --comment WAN-INBOUND-5 -m set --match-set PROBES src -m set --match-set PUBLIC dst -j RETURN -A WAN-INBOUND -s X.X.0.1/32 -d X.X.10.100/32 -p tcp -m comment --comment WAN-INBOUND-25 -m tcp --dport 443 -j RETURN -A WAN-INBOUND -s X.X.136.198/32 -p icmp -m comment --comment WAN-INBOUND-100 -m set --match-set NAGIOS_PROBES dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2000 -m tcp --dport 22 -m set --match-set G-22-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2001 -m tcp --dport 3389 -m set --match-set G-3389-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2002 -m tcp --dport 80 -m set --match-set G-80-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2003 -m tcp --dport 443 -m set --match-set G-443-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2004 -m tcp --dport 53 -m set --match-set G-53-TCP dst -j RETURN -A WAN-INBOUND -p udp -m comment --comment WAN-INBOUND-2005 -m udp --dport 53 -m set --match-set G-53-UDP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2006 -m tcp --dport 25 -m set --match-set G-25-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2007 -m tcp --dport 143 -m set --match-set G-143-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2008 -m tcp --dport 110 -m set --match-set G-110-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2009 -m tcp --dport 1433 -m set --match-set G-1433-TCP dst -j RETURN -A WAN-INBOUND -p udp -m comment --comment WAN-INBOUND-2010 -m udp --dport 1433 -m set --match-set G-1433-UDP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2011 -m tcp --dport 3306 -m set --match-set G-3306-TCP dst -j RETURN -A WAN-INBOUND -p udp -m comment --comment WAN-INBOUND-2012 -m udp --dport 3306 -m set --match-set G-3306-UDP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2013 -m tcp --dport 20 -m set --match-set G-20-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2014 -m tcp --dport 21 -m set --match-set G-21-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2015 -m tcp --dport 465 -m set --match-set G-465-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2016 -m tcp --dport 587 -m set --match-set G-587-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2017 -m tcp --dport 993 -m set --match-set G-993-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2018 -m tcp --dport 995 -m set --match-set G-995-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2019 -m tcp --dport 8080 -m set --match-set G-8080-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2020 -m tcp --dport 8443 -m set --match-set G-8443-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2021 -m tcp --dport 10000 -m set --match-set G-10000-TCP dst -j RETURN -A WAN-INBOUND -p tcp -m comment --comment WAN-INBOUND-2022 -m tcp --dport 8447 -m set --match-set G-8447-TCP dst -j RETURN -A WAN-INBOUND -m comment --comment WAN-INBOUND-2040 -m set --match-set G-ALL_OPEN dst -j RETURN -A WAN-INBOUND -p icmp -m comment --comment WAN-INBOUND-2050 -m set --match-set G-ICMP dst -j RETURN -A WAN-INBOUND -m comment --comment "WAN-INBOUND-10000 default-action drop" -j DROP COMMIT # Completed on Fri Feb 16 12:02:44 2018 # Generated by iptables-save v1.4.21 on Fri Feb 16 12:02:44 2018 *raw :PREROUTING ACCEPT [0:0] :OUTPUT ACCEPT [0:0] :FW_CONNTRACK - [0:0] :FW_STATE_POLICY_CONNTRACK - [0:0] :NAT_CONNTRACK - [0:0] :VYATTA_CT_HELPER - [0:0] :VYATTA_CT_IGNORE - [0:0] :VYATTA_CT_OUTPUT_HOOK - [0:0] :VYATTA_CT_PREROUTING_HOOK - [0:0] :VYATTA_CT_TIMEOUT - [0:0] -A PREROUTING -j VYATTA_CT_IGNORE -A PREROUTING -j VYATTA_CT_HELPER -A PREROUTING -j VYATTA_CT_TIMEOUT -A PREROUTING -j VYATTA_CT_PREROUTING_HOOK -A PREROUTING -j NAT_CONNTRACK -A PREROUTING -j FW_CONNTRACK -A PREROUTING -j FW_STATE_POLICY_CONNTRACK -A PREROUTING -j NOTRACK -A OUTPUT -j VYATTA_CT_IGNORE -A OUTPUT -j VYATTA_CT_HELPER -A OUTPUT -j VYATTA_CT_TIMEOUT -A OUTPUT -j VYATTA_CT_OUTPUT_HOOK -A OUTPUT -j NAT_CONNTRACK -A OUTPUT -j FW_CONNTRACK -A OUTPUT -j FW_STATE_POLICY_CONNTRACK -A OUTPUT -j NOTRACK -A FW_CONNTRACK -j RETURN -A FW_STATE_POLICY_CONNTRACK -j ACCEPT -A NAT_CONNTRACK -j ACCEPT -A VYATTA_CT_HELPER -p tcp -m tcp --dport 1536 -j CT --helper tns -A VYATTA_CT_HELPER -p tcp -m tcp --dport 1525 -j CT --helper tns -A VYATTA_CT_HELPER -p tcp -m tcp --dport 1521 -j CT --helper tns -A VYATTA_CT_HELPER -p udp -m udp --dport 111 -j CT --helper rpc -A VYATTA_CT_HELPER -p tcp -m tcp --dport 111 -j CT --helper rpc -A VYATTA_CT_HELPER -j RETURN -A VYATTA_CT_IGNORE -j RETURN -A VYATTA_CT_OUTPUT_HOOK -j RETURN -A VYATTA_CT_PREROUTING_HOOK -j RETURN -A VYATTA_CT_TIMEOUT -j RETURN COMMIT # Completed on Fri Feb 16 12:02:44 2018
Can you attach output of
The last nine months or so I've been running Tayga on VyOS Beta 1.2 (latest versions) in my production network.
I'm attempting to go all IPv6 internally so this would be nice to have if it doesn't currently work.
"unbound" is also another good recursor.
Feb 15 2018
Hi, on 999.201801111542 can still be reproduced:
Feb 12 2018
I stand corrected. I was not aware 2516 had been updated let alone that the update was ratified.
I actually just found this https://tools.ietf.org/html/rfc4638
RFC4638 "Accommodating a Maximum Transit Unit/Maximum Receive Unit (MTU/MRU) Greater Than 1492 in the Point-to-Point Protocol over Ethernet (PPPoE)"
I have to apologize. I did not read this RFC until now. I thought that since many Routers/Firewalls support this it would be a good idea to have it in VyOS too.
It is very unfortunate that this RFC was never updated.
Sorry but that does not seem a good reason to deny a feature like this.
Actually every chipset of every device i had in my hand supports packets a little bit bigger than 1500. Usually somewhere between 1600 and 2xxx bytes. So no problem there.
There really isn't a good reason to do this. The performance difference is minuscule even if you were sending maximum size packets all the time which you won't be. Plus- if it doesn't work- it will likely manifest as an intermittent problem that will be very difficult to track down.
OK this is my starting config for the interface:
What's the reported error when you increaste the MTU?
@alainlamar that sounds familiar, have you verified that you use the proper priority: tags inside your node.def files?
Feb 11 2018
Pull request sent. Please consider for merge.
Works fine on the latest nightly.
Merged and Build triggered.
@alainlamar clearfog is the ARM build for https://www.solid-run.com/marvell-armada-family/clearfog/
Cheers @c-po! Unfortunately, the build failed with reference to "clearfog". Do you know what this is or if I could fix this somehow in vyatta-wireless?
Right now, I have no idea...
@syncer I could try to test it with a fake configuration to check if it works in theory.
... done
Thanks @woodypl !
@dmbaturin @c-po can you take a look please
In T452#11673, @dmbaturin wrote:Merged.
It will have to be refactored for the new vyos-1x approach, but then the entire package will, so we'll better have the .ac support now, and refactor later.
@sergei yes, please put it here for records
I found VPN tunnel with esp lifetime of 43200 sec (12 hrs) is stable. Can share my config if necessary.
This is a new bug, please file it and I‘ll try to look into it. Thanks.
I tested with vyos.999.201802100337 and the original problem is solved.....However....
Feb 10 2018
for type1 we need setup LACP by default