PR for crux https://github.com/vyos/vyos-1x/pull/582
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Nov 1 2020
Oct 27 2020
Oct 26 2020
Once this task is solved, QoS documentation should include a subsection about NAT, explaining the procedure for both outbound and inbound traffic.
Oct 25 2020
Oct 22 2020
It looks good, I want to ask how other people in the community think about this?
- If the user configures his cluster as a "pool" or a bunch of "server" they should work fine, he can also "allow" them to connect to him if he wishes. I would recommend connecting to a good pool myself, or a low stratum device hosted locally, instead of making some kind of cluster.
- https://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-users/2016/03/msg00001.html
Does anyone understand the meaning of these performance data? I don’t know the unit of these data
- 1. When the user's data source uses NTP cluster, whether switching to the new service may lead to the compatibility problem of NTP cluster network
Yes, absolutely, and if you visit the link in the post you'll see a comparison of them, and at the bottom is some explanation.
Can chronyd completely replace NTP?
Oct 21 2020
Do we need it for "crux"?
This does not affect the work of VPN service.
Oct 20 2020
Oct 19 2020
It looks like this works, but when we don't have any connected user, it listed the current directory file
vyos@RTR1:~$ touch 1.txt vyos@RTR1:~$ reset vpn remote-access user <tab> Possible completions: 1.txt Terminate specified user's current remote access VPN session(s)
After a user connected, all works properly
vyos@RTR1:~$ reset vpn remote-access user <tab> Possible completions: test1 Terminate specified user's current remote access VPN session(s)
Oct 17 2020
Oct 16 2020
@c-po @dmbaturin It can be safely cherry-picked to the "crux".
I tested this on 1.2.6-s1, it works.
It was fixed in the rolling T2573
https://phabricator.vyos.net/rVYOSONEXf812c5d1ce01efa8323bfb797c57f68f474665bb
Oct 15 2020
@Robot82
It will be by default in the new BGP implementation.
https://github.com/vyos/vyos-1x/blob/current/data/templates/frr/bgp.frr.tmpl#L5
OK, thank you. I will test this. This should probably be made as default.
This has come up multiple times before, see https://phabricator.vyos.net/T1698 for the solution.
Oct 14 2020
Oct 13 2020
Oct 8 2020
Oct 6 2020
Oct 2 2020
Note: New xl2tpd package does not work with the followings params in options.xl2tpd
crtscts lock
At this stage, I can't realize the automatic configuration of NDP proxy. On the other hand, although I don't know what additional application scenarios will be in addition to nat66, I hope to give full play to the full potential of NDP proxy, so I don't want to bind it to nat66 artificially.
Oct 1 2020
Still wondering why ndp-proxy can not be part of the nat66 tree.
When a NAT66 translation is added we know the prefix (src and dst), the in/out-bound interface - so another CLI option (ndp-proxy) could probably be added to not open up an additional service node.
@c-po Request merge https://github.com/vyos/vyos-1x/pull/556
In T2943#76739, @runar wrote:as a workaround you could add this to a post-boot script on the device.
This is disallowed by design by the VyOS team. the reason for this is partly because of the configuration order done by VyOS and how the dns lookup is handled by Wireguard.
Yes, the wg configuration utillity DOES handle DNS lookups, but NO, Wireguard does not handle them. This means that the DNS lookups is done once (and only once) when the wg command is executed on creation of the tunnel and then the resulting ip result is stored in wireguard. this results in the dns lookup will fail after a reboot of the VyOS device because it cant resolve the dns of the endpoint at that point (this is done before routing is enabled on the device)
PR for Rolling https://github.com/vyos/vyos-1x/pull/559
Sep 30 2020
Already basically ready to merge
PR for crux https://github.com/vyos/vyos-1x/pull/558
Sep 29 2020
Sep 28 2020
Sep 27 2020
Write redundant and intrusive code for all interface types, which may introduce unknown errors (I can’t guarantee 100% accuracy without testing)
@c-po I am thinking about a problem. Placing proxy-ndp under the child node of interface may generate redundant implementation code and is intrusive. In fact, for proxy-ndp, only one configuration file is needed. Is this Reasonable? I don't even know how to fully test whether the intrusive code affects the basic functions of the router.
Sep 26 2020
It looks like this problem is around here
https://github.com/vyos/vyatta-cfg/blob/current/etc/bash_completion.d/vyatta-cfg#L280-L290
Sep 25 2020
Yes that's correct. And there is already some sort of check implemented for the node traffic-policy, so it does not fail when the pppoe interface does not exist yet. It just shows a warning: https://github.com/vyos/vyatta-cfg-qos/blob/bbf2b2f06b7a0f883f7134df5e2b3e089015738e/scripts/vyatta-qos.pl#L198
I think I know what's happening here.
Sep 23 2020
Sep 22 2020
PR for rolling https://github.com/vyos/vyatta-cfg-vpn/pull/38
It declared 2 times, because there is 2 checks
This is the output of this line
Sep 21 2020
Sep 20 2020
@c-po If I want to be an interface-ethernet.xml.in Add custom configuration actions (such as proxy NDP) with certain extensibility (its configuration can be extended in other places). What should I do?
In T2898#75677, @jack9603301 wrote:I also take into account the specific situation of the ndp proxy, the configuration of this link prompts, the configuration format of the ndp proxy is like this.
https://manpages.debian.org/buster/ndppd/ndppd.conf.5.en.html
Sep 19 2020
I also take into account the specific situation of the ndp proxy, the configuration of this link prompts, the configuration format of the ndp proxy is like this.
No arp proxy option is found in the configuration path, ndp proxy can manage multiple address rules under one interface
vyos@vyos# set interfaces ethernet eth0 ip
Possible completions:
arp-cache-timeout
ARP cache entry timeout in seconds
disable-arp-filter
Disable ARP filter on this interface
enable-arp-accept
Enable ARP accept on this interface
enable-arp-announce
Enable ARP announce on this interface
enable-arp-ignore
Enable ARP ignore on this interface
enable-proxy-arp
Enable proxy-arp on this interface
> ospf Open Shortest Path First (OSPF) parameters
proxy-arp-pvlan
Enable private VLAN proxy ARP on this interface
> rip Routing Information Protocol (RIP)
source-validation
Policy for source validation by reversed path, as specified in RFC3704Although I intended to think that it is easier to write scripts under the protocol, but from an intuitive point of view, it seems that this path is also a good choice (users can use the same command line as the arp proxy to configure) I have written it A sample, then only need to decide how to modify the cli
In T2898#75670, @Cheeze_It wrote:In T2898#75656, @jack9603301 wrote:set interfaces ethernet eth0 ip proxy-arp
The more suitable position may be set protocol ndp-proxy
I...really would like to not put it under "protocols" but to put it under the interface. It's *much* easier and more intuitive to see it under the interface/sub-interface than to see it in its' own stanza under "protocol" node.
Also, I'd argue it would be reasonable to separate ARP proxy and NDP proxy. That way one can pick and choose. Of course ARP proxy can't work without an IP address configured. NDP proxy can't be configured without an IPv6 address configured (those could be used as checks against configuring it on an empty interface).
If possible, give your suggested cli path for my reference
In T2898#75656, @jack9603301 wrote:set interfaces ethernet eth0 ip proxy-arp
The more suitable position may be set protocol ndp-proxy
I can't find how to enable ipv6 connection tracking. Recompiling and modifying the linux kernel switch does not seem to see the module loaded. I think the current nat66 has completed 90%, and only need to implement ndp proxy to make it work normally.
set interfaces ethernet eth0 ip proxy-arp
I think we do need it, we can’t let users manage all IP manually unless we implement stateful NAT66
set interfaces ethernet eth0 ip proxy-arp. Isn‘t the Kernel sysctl interface enough? Do we really need a daemon?