This issue should be fixed after these changes https://phabricator.vyos.net/T1970 (udevadm settle)
Tested on EdgeCore SAF51015I with generic ISOs.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Nov 15 2021
Nov 11 2021
Does not possible to reproduce this behavior on 1.3-epa3.
Nov 10 2021
Nov 5 2021
Nov 4 2021
Nov 3 2021
Oct 28 2021
Oct 25 2021
Oct 3 2021
Sep 2 2021
PR for current https://github.com/vyos/vyos-1x/pull/988
Sep 1 2021
PR https://github.com/vyos/vyos-1x/pull/987
Can we cherry-pick this patch to the current branch?
Aug 18 2021
Aug 12 2021
Aug 9 2021
PR for Equuleus https://github.com/vyos/vyos-1x/pull/959
Tested on 1.3-rc5, all works properly
set vpn ipsec esp-group ESP_DEFAULT compression 'disable' set vpn ipsec esp-group ESP_DEFAULT lifetime '3600' set vpn ipsec esp-group ESP_DEFAULT mode 'tunnel' set vpn ipsec esp-group ESP_DEFAULT pfs 'dh-group19' set vpn ipsec esp-group ESP_DEFAULT proposal 10 encryption 'aes128' set vpn ipsec esp-group ESP_DEFAULT proposal 10 hash 'sha256' set vpn ipsec ike-group IKEv2_DEFAULT close-action 'none' set vpn ipsec ike-group IKEv2_DEFAULT dead-peer-detection action 'hold' set vpn ipsec ike-group IKEv2_DEFAULT dead-peer-detection interval '30' set vpn ipsec ike-group IKEv2_DEFAULT dead-peer-detection timeout '120' set vpn ipsec ike-group IKEv2_DEFAULT ikev2-reauth 'no' set vpn ipsec ike-group IKEv2_DEFAULT key-exchange 'ikev2' set vpn ipsec ike-group IKEv2_DEFAULT lifetime '10800' set vpn ipsec ike-group IKEv2_DEFAULT mobike 'disable' set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 dh-group '19' set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 encryption 'aes128' set vpn ipsec ike-group IKEv2_DEFAULT proposal 10 hash 'sha256'
Flow served QAT
vyos@R2-QAT# run show system acceleration qat device qat_dev0 flows +------------------------------------------------+ | FW Statistics for Qat Device | +------------------------------------------------+ | Firmware Requests [AE 0]: 60046 | | Firmware Responses[AE 0]: 60046 | +------------------------------------------------+ | Firmware Requests [AE 1]: 112720 | | Firmware Responses[AE 1]: 112720 | +------------------------------------------------+ | Firmware Requests [AE 2]: 219657 | | Firmware Responses[AE 2]: 219657 | +------------------------------------------------+ | Firmware Requests [AE 3]: 60046 | | Firmware Responses[AE 3]: 60046 | +------------------------------------------------+ | Firmware Requests [AE 4]: 112722 | | Firmware Responses[AE 4]: 112722 | +------------------------------------------------+ | Firmware Requests [AE 5]: 219657 | | Firmware Responses[AE 5]: 219657 | +------------------------------------------------+
Interrupts
vyos@R2-QAT# run show system acceleration qat interrupts 140: 44039 0 0 0 0 0 0 0 IR-PCI-MSI 524288-edge qat0-bundle0 141: 0 42358 0 0 0 0 0 0 IR-PCI-MSI 524289-edge qat0-bundle1 142: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524290-edge qat0-bundle2 143: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524291-edge qat0-bundle3 144: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524292-edge qat0-bundle4 145: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524293-edge qat0-bundle5 146: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524294-edge qat0-bundle6 147: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524295-edge qat0-bundle7 148: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524296-edge qat0-bundle8 149: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524297-edge qat0-bundle9 150: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524298-edge qat0-bundle10 151: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524299-edge qat0-bundle11 152: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524300-edge qat0-bundle12 153: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524301-edge qat0-bundle13 154: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524302-edge qat0-bundle14 155: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524303-edge qat0-bundle15 156: 0 0 0 0 0 0 0 0 IR-PCI-MSI 524304-edge qat0-ae-cluster
PR for 1.3 https://github.com/vyos/vyos-1x/pull/957
Aug 6 2021
Hello @maznu , I also prefer the first variant set vpn l2tp remote-access lns host-name example.com I'm sure that we no need to overload l2tp remote-access root noded
Aug 5 2021
It is not critical, please test without this package "libstrongswan-standard-plugins"
All necessary data is already installed.
I have patched packages for 1.2.8. It works on my routers in the virtual environment.
Instruction:
- Upload package to the router
- Unarchiv it
sudo tar -xvf strongswan.tar
- Install packages
sudo dpkg -i *.deb
- Reboot router or reconfigure IPSec
Aug 3 2021
@Viacheslav I believe it is still actual for 1.3 https://github.com/vyos/vyos-1x/blob/equuleus/src/conf_mode/vpn_sstp.py#L60-L78
I saw we changed the PKI model only for 1.4. Implement PKI model for 1.3-epa1 a risky
Jul 29 2021
PR https://github.com/vyos/vyos-1x/pull/945
Also, need to cherry-pick it to Equuleus
Jul 26 2021
I think we need to reopen this task. Sometimes (one per hour) some users and I got similar messages on version 1.3-rc4/rc5
Jun 29 2021
Hello @joeudes , it looks like without enabled ppp-option ipv6 it should not work
set service pppoe-server ppp-options ipv6 allow
@Viacheslav it is reproducible in 1.2.7
vyos@vyos:~$ touch file1 vyos@vyos:~$ touch file2 vyos@vyos:~$ touch file3 vyos@vyos:~$ ls file1 file2 file3 vyos@vyos:~$ reset vpn remote-access user Possible completions: file1 Terminate specified user's current remote access VPN session(s) file2 file3
Jun 25 2021
Jun 16 2021
Jun 3 2021
Please, backport it to 1.3 rolling https://phabricator.vyos.net/rVYOSONEX4b646c1fb31a1a9f9c9d1658734d478fed5f19f1
Jun 2 2021
Extended scripts receive from PPPoE daemon the following variables:
$1 - Interface name $4 - Tunnel GW IP address $5 - Delegated IP address to the client $6 - Calling Station ID (MAC)
For example, how to get received RADIUS attributes
note: In this case, Filter-Id attribute used as an indicator for block user adding to ipset
configure set firewall group address-group blocked commit
Jun 1 2021
PR https://github.com/vyos/vyos-1x/pull/860
To provide the possibility to read RADIUS attribute by script, also need to define radattr=/run/radattr param
May 28 2021
Properly works on the latest 1.4 rolling. Is it possible to backport changes to 1.3?
May 27 2021
PR https://github.com/vyos/vyos-build/pull/166
server "time1.vyos.net" server "time2.vyos.net" server "time3.vyos.net"
May 26 2021
I propose something like
set service pppoe-server extended-scripts on-pre-up <path> set service pppoe-server extended-scripts on-up <path> set service pppoe-server extended-scripts on-down <path> set service pppoe-server extended-scripts on-change <path>
May 18 2021
Tested on 1.4-rolling-202105170417 works correct. Propose to backport this to 1.3
May 14 2021
May 13 2021
May 2 2021
Hi @hard, I think behavior should be another for VM. Did you try to change speed when you connected via serial?
Apr 27 2021
Work as expected on 1.4-rolling-202104260417
vyos@R1:~$ show dhcpv6 server leases IPv6 address State Last communication Lease expiration Remaining Type Pool IAID_DUID ------------------ ------- -------------------- ------------------- ----------- ----------------- ----------- ----------------------------------------------------- 2001:db8:290::/64 active 2021/04/23 14:52:48 prefix delegation VyOS-DHCPv6 00:00:00:00:00:01:00:01:28:15:9b:bd:50:00:00:06:00:00 2001:db8:3456::15b active 2021/04/27 05:07:51 2021/04/27 17:07:51 10:28:27 non-temporary VyOS-DHCPv6 00:00:00:00:00:01:00:01:28:15:9b:bd:50:00:00:06:00:00
Apr 26 2021
Apr 23 2021
Apr 18 2021
Apr 16 2021
Apr 9 2021
Add PR with improvements to documentation https://github.com/vyos/vyos-documentation/pull/503
Thanks. I think the main issue is missing required modules in the generated pppoe server config file
sudo cat /run/accel-pppd/pppoe.conf ### generated by accel_pppoe.py ### [modules] log_syslog pppoe shaper chap-secrets ippool auth_pap auth_chap_md5 auth_mschap_v1 auth_mschap_v2
Required
ipv6pool ipv6_nd ipv6_dhcp
These option enables by the foloowing CLI command::
set service pppoe-server ppp-options ipv6 allow
Apr 8 2021
It looks like the same nature of this issue https://phabricator.vyos.net/T3393
@c-po , could you try to test fast solution
configure set system sysctl custom net.ipv6.conf.default.addr_gen_mode value 0 commit
Apr 7 2021
Mar 17 2021
Works correct for q, but still show backtrace by Ctrl+C
:Traceback (most recent call last):
File "/usr/libexec/vyos/op_mode/ppp-server-ctrl.py", line 74, in <module>
main()
File "/usr/libexec/vyos/op_mode/ppp-server-ctrl.py", line 63, in main
print(output)
KeyboardInterruptLets change except BrokenPipeError: to except:
Mar 16 2021
@Viacheslav . Ok this is not a problem, because we have a workaround with pseudo ethernet interfaces
set interfaces pseudo-ethernet peth1 source-interface 'eth1' set service pppoe-server interface peth1 set service pppoe-server interface eth1 vlan-id '50' set service pppoe-server interface eth1 svlan 1000 vlan-range '1-4095'
Now all looks good and works properly, but need to add better help value
vyos@vyos# set service pppoe-server interface eth3 vlan-id Possible completions: <text> VLAN monitor for the automatic creation of vlans (user per vlan)
To disable udev link_config redundancy call we need to delete /usr/lib/systemd/network/99-default.link
Mar 15 2021
@dmbaturin please cherry-pick this to equuleus. Successfully tested on VyOS-1.3-RC1
Mar 13 2021
Yes, some time ago, it could produce kernel issues https://www.mail-archive.com/netdev@vger.kernel.org/msg218964.html
And I think it will be good to add the possibility to control unit-cache to have the opportunity to influence this.
Mar 12 2021
Mar 11 2021
Fresh SNMP Daemon has some option which might be helpful
https://manpages.debian.org/unstable/snmpd/snmpd.conf.5.en.html
ifmib_max_num_ifaces NUM
Configured SNMP also add impact
top - 12:51:59 up 3:25, 2 users, load average: 1.35, 0.70, 0.28 Tasks: 214 total, 2 running, 210 sleeping, 2 stopped, 0 zombie %Cpu0 : 0.0 us, 0.0 sy, 0.0 ni, 99.7 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st %Cpu1 : 22.6 us, 77.4 sy, 0.0 ni, 0.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st %Cpu2 : 0.0 us, 0.3 sy, 0.0 ni, 99.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st %Cpu3 : 0.0 us, 0.0 sy, 0.0 ni,100.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st MiB Mem : 9972.9 total, 6710.1 free, 2044.5 used, 1218.3 buff/cache MiB Swap: 0.0 total, 0.0 free, 0.0 used. 7195.8 avail Mem
Mar 10 2021
@jack9603301 it looks like this issue related to your patch https://github.com/vyos/vyatta-cfg-qos/commit/6391325271be489d29f0b7aa2982952068c6a53c
T3089
Mar 9 2021
Also, add some overhead netplug
top - 19:14:34 up 26 min, 1 user, load average: 10.29, 13.17, 8.57 Tasks: 568 total, 5 running, 228 sleeping, 0 stopped, 335 zombie %Cpu0 : 5.0 us, 10.6 sy, 0.0 ni, 84.4 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st %Cpu1 : 9.8 us, 15.2 sy, 0.0 ni, 75.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st %Cpu2 : 40.7 us, 3.0 sy, 0.0 ni, 56.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st %Cpu3 : 9.6 us, 86.4 sy, 0.0 ni, 4.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st MiB Mem : 3870.9 total, 1375.2 free, 1499.9 used, 995.8 buff/cache MiB Swap: 0.0 total, 0.0 free, 0.0 used. 1716.8 avail Mem