@jack9603301 follow forum topic, all data randomized.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
All Stories
Jan 25 2021
For security, don't expose your user name and password
Jan 24 2021
In light of the mode-force in 1.2.x, we definitely can't make this the new default within an LTS branch.
show tech-support
Or the configuration is simply passed to the wrong daemon
The old scheme generate
PR https://github.com/vyos/vyatta-cfg-quagga/pull/65
Delete old Perl handler "vyatta-bgp.pl" for bgp.
This bug got fixed with https://phabricator.vyos.net/T3227
This bug got fixed with: https://phabricator.vyos.net/T3227
This works for me now (in 1.4-rolling-202101240218)
Jan 23 2021
Created the feature request on forum.
I've been refreshing the stack against current branch to keep testers building, and have added the FSGSBASE backport to 5.4 as a technical argument for keeping to a properly mature LTS even when users have a good case for needing newer functionality.
What is the plan of action for this effort, and is there a written policy on which kernels are selected and how they're selected for the OS? I can keep doing the rebase & push dance once a week or so, but is anyone on the VyOS team actually testing this stuff and has anyone upstream discussed the functional security benefits to users of GeoIP firewall filters or TARPIT/DELUDE/etc response actions separately from the system hardening functions inhere?