Also, as everything set in python will render True, couldn't is_value_changed return the old and new value instead of just true/false? This will make get_value_changed redundant
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
All Stories
Jul 6 2020
What about providing a is_changed, that returns False, added, deleted or changed with the new value provided in the result? Added/deleted/changed can be of a enum type or something like that
With 4.19.123-amd64-vyos I am having the same problems. I would assume, that the patch from 2016 is already in this kernel?
I have tested it in a simple configuration of zone-based firewall with both Crux and Rolling and everything worked ok.
Any chance this will be revived for 1.3 or 2.0 ?
Any amount of firewalling is not gonna stop brute forcing.
I don't see problems with Debian Buster, kernel "4.19.0-9"
Need to check this patch. Ref. https://patchwork.kernel.org/patch/9293785/
Ok, I will look at how we can use the current configuration to insert the tagNode name when we generate the default configuration
@c-po Yes, I checked it on Crux.
Works as expected.
So should be cherry-pick this to 1.2.6?
Community/large/extend community lists syntax was updated by FRR with "detail" https://phabricator.vyos.net/T2389
Jul 5 2020
This PR should correct the issue.
It should. This should really be a non-breaking change as it's a fallback for something else that already exists in /etc/hosts.
Just digging around I found this:
There is already a new build containing the fix.
@Viacheslav could you please check if this probably should make it into 1.2.6 in addition?
@c-po When you submit the following commit, the problem seems to be solved, when I need to do further testing tomorrow, waiting for tomorrow's daily build
Problem was introduced by porting PPPoE to the get_config_dict() implementation T2653 commit https://github.com/vyos/vyos-1x/commit/65fa21f5
The most likely culprit is /opt/vyatta/sbin/vyatta_interface_rescan. I'm not sure if this should be fixed or migrated to Python.
The rewrite would need to be done together with all other vyatta interface renaming and detection scripts.
Upgrading a different test VM with different config that starts at eth0: on 2nd reboot the hw-id lines are duplicated too, but they are the same on a single interface, and there are no new interfaces created, so the config loads and works fine. The duplicated hw-id lines stay in the config for all subsequent reboots.
Example:
ethernet eth0 {
address "192.0.2.1"
hw-id "52:54:00:2d:29:19"
ipv6 {
address {
}
}
smp-affinity "auto"
speed "auto"
hw-id 52:54:00:2d:29:19
}What I'm noticing is that the migration scripts save all nodes with quotes, but saving in config mode (through vyatta-cfg) results in most nodes not having quotes (mostly just those with spaces have it). Maybe there is a vyatta script that adds any new interfaces to config.boot that runs on each boot that doesn't like these quoted hw-id lines that the migration scripts produce.
I tried reupgrading from 1.3-rolling-202006110117 to 1.3-rolling-202007050117 and the exact same error occurred - on first reboot everything was fine (config.boot was migrated, looked correct, and loaded fine). On 2nd reboot, the exact same thing happened.
Necessary run service with priority for correct starting https://github.com/vyos/vyos-1x/pull/489
Does DNS static-host-mapping still work with the nssswich.conf change? I‘m just curious about the side effects.
@c-po The basic cause of the failure has been determined.This time, the problem may be relatively serious, because it is not the configuration of the service, but the execution of commit will not start the dhcp6c service at all.
Jul 4 2020
default as an IP address is in the end more useful then a resolved PTR
Duplicate of T2627
Somehow I do not want to change the overall system behavior by altering nsswitch.conf. I wonder if we should not enable "disable-host-ookups" by default as an IP address is in the end more useful then a resolved PTR. A PTR record can be changed later on when dissecting the logfiles but an IP lookup should stay longer.
Linux tries to bind SSHd to the VRF but it is yet not ready. After restarting SSH to often (rate-limiting) it is blocked.
Oddly enough, whether I change the service settings or change the default settings of systemd, there are problems.
@c-po The problem was found when upgrading to the latest version, and the reason is not clear.
PPPoE is configured as follows (account password is hidden):
I want to do it and have to re explore the cause of the failure, but I haven't found out why dhcp6c can't start, I have to start it manually.
Changing the systemd defaults is a thing I hesitate to do! It will have a ton of unexpected sideeffects. I guess you have an error in your entire setup as multiple sites of mine work flawlessly
Strange, I found that this service may not have been started at all!
for me it looks like a name lookup error. I have read the forum entry mentioned above. And they fixed it by disabling name lookup.
I found that I had disable-host-validation configured and as soon as I removed it it happened to me, too. Changing task priority.
I have checked with a v4/v6 full table router and VyOS 1.2.5 - each SSH session will consume 7MiB which semms okay for me.
Availible in keepalived, thus kt could be considered for 1.3
This also has a measurable impact on CPU. You can tell exactly when I applied the nsswitch.conf fix.
forwarding {
allow-from 192.168.0.0/16
allow-from 2001:470:f1cd::/48
cache-size 1024
domain pve. {
addnta
recursion-desired
server 192.168.0.47
server 2001:470:f1cd::47
}
listen-address 0.0.0.0
listen-address ::
name-server 2001:470:f1cd::ff00
name-server 192.168.0.254
name-server 202.96.134.33
name-server 202.96.128.86
name-server 114.114.114.114
name-server 1.1.1.1
name-server 1.0.0.1
system
}Oh, in a system like vyos, SSH memory leak appears to be relatively serious. If there is a solution, it should be handled first
Jul 3 2020
To add to this, this link pointed me at the correct solution:
PR https://github.com/vyos/vyos-1x/pull/487 with changed CLI to service ids ddos-protection.
@elianora Email me at david@summersoft.fay-ar.us
Again, please always attach a configuration file