@c-po Do you have any idea for CLI?
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
All Stories
Feb 9 2023
Feb 8 2023
@skoenman Could you write some examples of configuration?
@Usman there is a root task for op-mode rewriting https://phabricator.vyos.net/T4564
https://github.com/vyos/vyos-1x/blob/1042fc32c371a74f048ffaf9a551b5d13c227f45/src/op_mode/bgp.py#L77-L80
@Viacheslav Thanks, that works great!
@Usman You have to update to the latest rolling.
https://vyos.net/get/nightly-builds/
Thanks for the reply.
Hi perhaps it is better to get JSON format
I would prefer a different syntax, in order to avoid the necessity attaching it to an interface. Maybe something like:
Error detected in forum: https://forum.vyos.io/t/unable-to-query-snmp-anymore-in-a-more-recent-1-4-version/10388/3
Fix for that bug: https://github.com/vyos/vyos-1x/pull/1805
Why did you delete this option and add a static route? Is there any use case?
This option has more priority than others.
Rewritten in 1.4
We are not planning to modify it in 1.3
Got it; it is impossible for now after this migration https://phabricator.vyos.net/T3090
We are working on the re-design firewall CLI
Feb 7 2023
I built a 1.4 ISO after my change was merged and deployed it to my home network. Setting a restrictive allow list works as expected, only the allowed IPs/subnets are able to use NTP. Removing all allow IPs prevents chrony/ntp from even listening to port 123. I don't think the "deny all" is needed in the code at all, but it is also not preventing the service to run as expected so I'll leave it.
@c-po is this an S3 bucket policy issue, or do the files not exist?
Setting it configurable will be a good solution.
Just like it is done in OpenVPN
vyos@r14# set interfaces openvpn vtun0 tls tls-version-min Possible completions: 1.0 TLS v1.0 1.1 TLS v1.1 1.2 TLS v1.2 1.3 TLS v1.3
Maybe, we need to handle cron script differently if ping failed?
Please let me know what should be the direction for solving this issue.
Feb 6 2023
We also need to increase opened file descriptors (ulimit -n) to listen limit + some margin.
And consider adding a warning about increasing net.core.optmem_max for systems with a limit of more than 100 peers.
It is a problem with mapping user to radius_priv_user
This problem began after https://github.com/vyos/vyos-1x/commit/765f84386b6e94984ff79db2eab36d51f759159b#diff-0ab0ed71ce757261c4a6ae2f3a5bc441d6257d477bfb5435ae38f230777ff81cR51
If I set in sshd_config
I'm not free now. I'll check it when I'm free
Feb 5 2023
@Viacheslav unfortunately I am not too familiar with your build system, but basically you need to clone the ovpn-dco repository (https://github.com/OpenVPN/ovpn-dco.git) and compile it against your kernel, as you would normally do for any other out-of-tree kernel module.
PR for alternative completion helper. This provides the same args/output of the Python script, with a speedup of 1--2 orders of magnitude; testing needed.
https://github.com/vyos/vyos-utils/pull/11
I just confirmed that it's still reproducible in VyOS 1.4-rolling-202301241944. It seems that I cannot copy stanza to a new name instead of trying to rename it, either.
Feb 4 2023
A basic implementation: https://github.com/vyos/vyos-1x/pull/1800
when an incompatible option is found, OpenVPN will simply disable DCO and go back to tun (this info will be logged). Therefore the limitations should not be a reason for not including DCO in VyOS.