- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
Feed Search
Oct 31 2022
Oct 31 2022
Viacheslav changed the status of T1875: Add the ability to use network address as BGP neighbor (bgp listen range), a subtask of T2174: Rewrite protocol BGP to new XML/Python style, from Unknown Status to Resolved.
Viacheslav changed the status of T1875: Add the ability to use network address as BGP neighbor (bgp listen range) from Unknown Status to Resolved.
Oct 29 2022
Oct 29 2022
@zsdc could we backport it to 1.3?
Oct 28 2022
Oct 28 2022
Viacheslav changed the status of T4771: Rewrite protocol BGP op-mode to vyos.opmode format, a subtask of T4564: Root task for rewriting [op-mode] to vyos.opmode format, from Open to In progress.
Viacheslav changed the status of T4771: Rewrite protocol BGP op-mode to vyos.opmode format from Open to In progress.
Oct 27 2022
Oct 27 2022
Viacheslav closed T4762: Show nat rules with empty rules incorrect error, a subtask of T4564: Root task for rewriting [op-mode] to vyos.opmode format, as Resolved.
Viacheslav closed T4763: Change XML for Show nat destination statistics, a subtask of T4564: Root task for rewriting [op-mode] to vyos.opmode format, as Resolved.
Viacheslav changed the subtype of T4774: Disallow duplicate pubkey on peers of a wireguard interface from "Task" to "Bug".
Oct 25 2022
Oct 25 2022
Viacheslav closed T4720: Ability to configure SSH HostKeyAlgorithms, a subtask of T4712: Collaborative Protection Profile cPP for Network Devices root task, as Resolved.
Oct 23 2022
Oct 23 2022
Viacheslav closed T3723: op-mode IPSec show vpn ipsec sa output with underscores, a subtask of T2816: Rewrite IPsec scripts with the new XML/Python approach, as Resolved.
Oct 21 2022
Oct 21 2022
Viacheslav changed the status of T4767: replace sh to Python (generate_ipsec_debug_archive.sh) from Open to In progress.
Oct 20 2022
Oct 20 2022
Also, it can be wildcard-address
@Rain Could you create a PR?
Viacheslav changed the status of T4720: Ability to configure SSH HostKeyAlgorithms, a subtask of T4712: Collaborative Protection Profile cPP for Network Devices root task, from In progress to Needs testing.
Viacheslav changed the status of T4720: Ability to configure SSH HostKeyAlgorithms from In progress to Needs testing.
Viacheslav renamed T4764: NAT tables vyos_nat and vyos_static_nat not deleting after deleting nat from NAT tables vyos_nat and vyos_static_nat not delete after deleting nat to NAT tables vyos_nat and vyos_static_nat not deleting after deleting nat.
Viacheslav changed the status of T4763: Change XML for Show nat destination statistics, a subtask of T4564: Root task for rewriting [op-mode] to vyos.opmode format, from Open to In progress.
Viacheslav changed the status of T4763: Change XML for Show nat destination statistics from Open to In progress.
Viacheslav changed the status of T4762: Show nat rules with empty rules incorrect error, a subtask of T4564: Root task for rewriting [op-mode] to vyos.opmode format, from Open to In progress.
Viacheslav changed the status of T4762: Show nat rules with empty rules incorrect error from Open to In progress.
Oct 19 2022
Oct 19 2022
Viacheslav changed the subtype of T4762: Show nat rules with empty rules incorrect error from "Feature Request" to "Bug".
Oct 18 2022
Oct 18 2022
Viacheslav changed the status of T4758: Rewrite show dhcp server to vyos.opmode format, a subtask of T4564: Root task for rewriting [op-mode] to vyos.opmode format, from Open to In progress.
Viacheslav changed the status of T4758: Rewrite show dhcp server to vyos.opmode format from Open to In progress.
Viacheslav closed T4684: Rewrite show ip route by protocol to vyos.opmode format, a subtask of T4564: Root task for rewriting [op-mode] to vyos.opmode format, as Resolved.
Tested with next configuration:
vyos@r14:~$ sudo cat /etc/pam.d/common-auth auth required pam_env.so auth required pam_faillock.so preauth silent audit deny=3 unlock_time=300 auth sufficient pam_unix.so nullok try_first_pass auth [default=die] pam_faillock.so authfail audit deny=3 unlock_time=300 auth requisite pam_succeed_if.so uid >= 1000 quiet_success auth required pam_deny.so vyos@r14:~$
Viacheslav changed the status of T4714: Delete unused ipset from the filecaps from In progress to Needs testing.
Viacheslav changed the status of T4714: Delete unused ipset from the filecaps from Open to In progress.
Oct 17 2022
Oct 17 2022
Viacheslav updated the task description for T4712: Collaborative Protection Profile cPP for Network Devices root task.
Viacheslav changed the status of T4720: Ability to configure SSH HostKeyAlgorithms, a subtask of T4712: Collaborative Protection Profile cPP for Network Devices root task, from Open to In progress.
Viacheslav changed the status of T4720: Ability to configure SSH HostKeyAlgorithms from Open to In progress.
PR https://github.com/vyos/vyos-1x/pull/1601
set service ssh hostkey-algorithm 'sk-ssh-ed25519@openssh.com' set service ssh hostkey-algorithm 'ssh-rsa'
@CuBiC3D There is a comment of the commit https://github.com/vyos/vyos-1x/commit/373227e717fac82af5ea8d71e611a3df1c59054e
Viacheslav added a project to T4752: ICMP redirects not working / not properly configured: VyOS 1.4 Sagitta.
Oct 15 2022
Oct 15 2022
Oct 14 2022
Oct 14 2022
Viacheslav changed the status of T4533: Radius clients don’t have simple permissions from Open to Needs testing.
Viacheslav moved T4533: Radius clients don’t have simple permissions from Open to Backport Candidates on the VyOS 1.4 Sagitta board.
@adaker
Could you describe the check/test procedure, how to test that all works as you expected?
I mean Linux man https://man7.org/linux/man-pages/man5/sshd_config.5.html
HostKeyAlgorithms
Specifies the host key signature algorithms that the server
offers. The default for this option is:Also, it should be enabled by default (at least in ssh documentation)
Could you check it?
We already have task T4720
Viacheslav changed the status of T4725: Unable to reset vpn IPsec peer from In progress to Needs testing.
PR https://github.com/vyos/vyos-1x/pull/1596
vyos@r14:~$ show vpn ipsec sa
Connection State Uptime Bytes In/Out Packets In/Out Remote address Remote ID Proposal
----------------- ------- -------- -------------- ---------------- ---------------- ----------- ---------------------------------------
OFFICE-B-tunnel-0 up 4s 0B/0B 0/0 192.0.2.2 192.0.2.2 AES_CBC_256/HMAC_SHA2_256_128/MODP_1024
vyos@r14:~$
vyos@r14:~$
vyos@r14:~$ reset vpn ipsec-peer OFFICE-B
closing CHILD_SA OFFICE-B-tunnel-0{16} with SPIs cc364877_i (0 bytes) c521f540_o (0 bytes) and TS 192.168.0.0/24 === 10.0.0.0/21
CHILD_SA {16} closed successfully
generating QUICK_MODE request 1449430238 [ HASH SA No KE ID ID ]
sending packet: from 192.0.2.1[500] to 192.0.2.2[500] (332 bytes)
received packet: from 192.0.2.2[500] to 192.0.2.1[500] (332 bytes)
parsed QUICK_MODE response 1449430238 [ HASH SA No KE ID ID ]
selected proposal: ESP:AES_CBC_256/HMAC_SHA2_256_128/MODP_1024/NO_EXT_SEQ
CHILD_SA OFFICE-B-tunnel-0{17} established with SPIs cd451e27_i cfb63c3c_o and TS 192.168.0.0/24 === 10.0.0.0/21
generating QUICK_MODE request 1449430238 [ HASH ]
sending packet: from 192.0.2.1[500] to 192.0.2.2[500] (76 bytes)
connection 'OFFICE-B-tunnel-0' established successfully
Peer reset result: success
vyos@r14:~$Oct 13 2022
Oct 13 2022
Viacheslav changed the subtype of T2958: DHCP server doesn't work from a live CD from "Task" to "Bug".
Viacheslav edited projects for T3011: router becomes unreachable for few minutes when vti interfaces goes down, added: VyOS 1.4 Sagitta; removed vyos-frr.
Oct 13 2022, 4:02 PM · Restricted Project
Viacheslav added a project to T2113: OpenVPN Options error: you cannot use --verify-x509-name with --compat-names or --no-name-remapping: VyOS 1.4 Sagitta.
Oct 13 2022, 3:59 PM · VyOS 1.4 Sagitta (1.4.0-epa1), Restricted Project, VyOS 1.3 Equuleus (1.3.7), openvpn
Viacheslav changed the status of T3965: arm: Extend configure scripts to allow for arm builds from Open to Needs testing.
Viacheslav added a project to T4303: BGP neighbor interface v6only fails to commit: VyOS 1.4 Sagitta.
I can't reproduce this bug with the latest rolling
vyos@r14# run show conf com | match bgp set protocols bgp address-family ipv4-unicast redistribute connected set protocols bgp neighbor eth1 interface remote-as '65001' set protocols bgp neighbor eth1 interface v6only peer-group 'SPING' set protocols bgp peer-group SPING address-family ipv4-unicast set protocols bgp peer-group SPING address-family ipv6-unicast set protocols bgp peer-group SPING capability extended-nexthop set protocols bgp peer-group SPING password 'foo' set protocols bgp system-as '65001'