PR for 1.3 https://github.com/vyos/vyos-1x/pull/2381
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Oct 19 2023
PR for 1.5 current https://github.com/vyos/vyos-1x/pull/2378
File gets generated but could be not extracted nor transferred as it tries to resolve it as hostname
Interestingly enough, I just found this error as well, but showed lines 173, 130, and 66.
Oct 18 2023
This has been verified to be a driver issue as the Intel's out-of-tree module for ixgbe does indeed work when I compilied my own version of the ISO with the Intel's out-of-tree-module installed.
Implementation; this may be slightly revised before PR, to provide extra data ...
https://github.com/vyos/vyos-1x/compare/current...jestabro:commit-schedule
vyos logs
Oct 18 14:16:41 sshd[24197]: pam_succeed_if(sshd:auth): requirement "service = sudo" not met by user "olofl" Oct 18 14:16:41 sshd[24197]: pam_succeed_if(sshd:account): requirement "service = sudo" not met by user "olofl" Oct 18 14:16:41 sshd[24197]: Accepted password for olofl from 10.6.10.89 port 47110 ssh2 Oct 18 14:16:41 sshd[24197]: pam_succeed_if(sshd:session): requirement "service = sudo" not met by user "olofl" Oct 18 14:16:41 sshd[24197]: pam_unix(sshd:session): session opened for user olofl(uid=1001) by (uid=0) Oct 18 14:16:41 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001. Oct 18 14:16:41 systemd[1]: Starting [email protected] - User Runtime Directory /run/user/1001... Oct 18 14:16:41 systemd-logind[1259]: New session 129 of user olofl. Oct 18 14:16:41 systemd[1]: Finished [email protected] - User Runtime Directory /run/user/1001. Oct 18 14:16:41 systemd[1]: Starting [email protected] - User Manager for UID 1001... Oct 18 14:16:41 (systemd)[24203]: pam_succeed_if(systemd-user:account): requirement "service = sudo" not met by user "olofl" Oct 18 14:16:41 (systemd)[24203]: pam_succeed_if(systemd-user:session): requirement "service = sudo" not met by user "olofl" Oct 18 14:16:41 (systemd)[24203]: pam_unix(systemd-user:session): session opened for user olofl(uid=1001) by (uid=0) Oct 18 14:16:41 rsyslogd[11051]: message repeated 69 times: [-- MARK --] Oct 18 14:16:41 rsyslogd[11051]: child process (pid 24200) exited with status 1 [v8.2302.0] Oct 18 14:16:41 systemd[24203]: Queued start job for default target default.target. Oct 18 14:16:41 systemd[24203]: Reached target paths.target - Paths. Oct 18 14:16:41 systemd[24203]: Reached target sockets.target - Sockets. Oct 18 14:16:41 systemd[24203]: Reached target timers.target - Timers. Oct 18 14:16:41 systemd[24203]: Reached target basic.target - Basic System. Oct 18 14:16:41 systemd[24203]: Reached target default.target - Main User Target. Oct 18 14:16:41 systemd[24203]: Startup finished in 64ms. Oct 18 14:16:41 systemd[1]: Started [email protected] - User Manager for UID 1001. Oct 18 14:16:41 systemd[1]: Started session-129.scope - Session 129 of User olofl. Oct 18 14:16:41 systemd[1]: opt-vyatta-config-tmp-new_config_24226.mount: Deactivated successfully. Oct 18 14:16:41 sshd[24197]: pam_env(sshd:session): deprecated reading of user environment enabled
testing another radius user
Oct 18 14:19:32 sshd[24610]: pam_succeed_if(sshd:auth): requirement "service = sudo" not met by user "oxidized" Oct 18 14:19:32 sshd[24610]: pam_succeed_if(sshd:account): requirement "service = sudo" not met by user "oxidized" Oct 18 14:19:32 sshd[24610]: Accepted password for oxidized from 10.6.10.89 port 58054 ssh2 Oct 18 14:19:32 sshd[24610]: pam_succeed_if(sshd:session): requirement "service = sudo" not met by user "oxidized" Oct 18 14:19:32 sshd[24610]: pam_unix(sshd:session): session opened for user oxidized(uid=1001) by (uid=0) Oct 18 14:19:32 systemd-logind[1259]: New session 132 of user olofl. Oct 18 14:19:32 systemd[1]: Started session-132.scope - Session 132 of User olofl. Oct 18 14:19:32 systemd[1]: opt-vyatta-config-tmp-new_config_24614.mount: Deactivated successfully. Oct 18 14:19:32 sshd[24610]: pam_env(sshd:session): deprecated reading of user environment enabled
What if you install the same version again but as a new boot name?
My radius user was not called admin, but local user called admin was configured before I tried.
I removed local admin user, and tried once again, and I get the same reults.
Furher to this, manually setting "mru 1500" gives me my 1500 MTU back again.
The new MRU config in 1.3.4 seems to have caused my MTU to be lower.
RNDIS is once more on the "removal" list of the Linux Kernel.
https://www.phoronix.com/news/Linux-Disabling-RNDIS-Drivers
Oct 17 2023
PR for current: https://github.com/vyos/vyos-1x/pull/2373
Out of the blue it looks like some compile thats gone wrong?
What is the exact path within the chroot directory?
It seems related https://vyos.dev/T5663
This will be fixed by merge of PR:
https://github.com/vyos/vyos-1x/pull/2371
Good point @Viacheslav apologies I was distracted at the time.
I can make it work by starting manually ( # ip vrf exec RCS3 zabbix_agent2 -c /run/zabbix/zabbix-agent2.conf )so I guess updating the systemd units file (/lib/systemd/system/zabbix-agent2.service) should make this work.
In T5657#162236, @bbabich wrote:Yep looks fine @Viacheslav
I've been using it like this for a while now but figure it may be useful as part of making 'VRFs' complete...$ sudo ip vrf exec RCS3 mtr 192.168.222.11
Yep looks fine @Viacheslav
I've been using it like this for a while now but figure it may be useful as part of making 'VRFs' complete...
Oct 16 2023
@fsbof This change was accepted so it should end up in the 1.5 rolling soon. I suspect backporting to 1.4 wouldn't be an issue but that is a question for a more senior dev. But as for 1.3, I am unsure as I have never ran that version and don't know if there are any changes between those releases that would make it a pain to backport.
Once accepted, I will update the documentation for this change as well as the ssh fingerprint change (T5653).