Page MenuHomeVyOS Platform

sskaje (sskaje)
User

Projects

User does not belong to any projects.

User Details

User Since
Mar 29 2023, 2:49 AM (89 w, 7 h)

Recent Activity

Sun, Dec 8

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#209720, @runar wrote:

Routgh idea:

If peer is created with hostname over IP, do not add it during commit

I would insist only not adding endpoint, let peer be ready if they have configured with hostname endpoint.

The peer should be pre-provisioned with everything needed to be accessible externally for a remote peer to reconnect prior to dns resolution.
To allow for this the peer can be added with a endpoint of 0.0.0.0. (if a wireguard peer is not able to be provisioned without a endpoint at least)
This can then be used to "abort" a DNS resolution if the remote end has reconnected.
Only the "resolve dns" part should then be the blocking part, and only that part needs to be moved out of the commit loop.

Sun, Dec 8, 1:58 PM · VyOS Rolling

Fri, Dec 6

sskaje added a comment to T6928: Support for custom interface type or custom config node.

I create drafted PR https://github.com/vyos/vyos-1x/pull/4224

Fri, Dec 6, 3:34 AM · VyOS Rolling

Tue, Dec 3

sskaje created T6930: if 'shutdown_required' in pppoe.py always True.
Tue, Dec 3, 7:51 AM · VyOS Rolling

Sun, Dec 1

sskaje added a comment to T6928: Support for custom interface type or custom config node.

I came up with a possible solution:

Sun, Dec 1, 3:46 PM · VyOS Rolling
sskaje added a comment to T6928: Support for custom interface type or custom config node.

Here are all config commands I used with my ubnt plugin

Sun, Dec 1, 3:26 PM · VyOS Rolling
sskaje updated the task description for T6928: Support for custom interface type or custom config node.
Sun, Dec 1, 3:23 PM · VyOS Rolling
sskaje created T6928: Support for custom interface type or custom config node.
Sun, Dec 1, 3:19 PM · VyOS Rolling

Sat, Nov 30

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

Code committed.

Sat, Nov 30, 4:52 PM · VyOS Rolling

Thu, Nov 28

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

Here is how to get the latest-handshakes in seconds:

Thu, Nov 28, 4:54 PM · VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#208881, @c-po wrote:

@runar @sskaje

In general I like the idea and it's a very useful addition. Given the current implementation and design of wireguard to be easy, lightweight and not messed with 1000 of config options the design choice is to move everything requiring brain out of the WG core code.

Thu, Nov 28, 7:40 AM · VyOS Rolling

Mon, Nov 25

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#208505, @runar wrote:

Hi!

I do not like the concept that this should be done inline while in the middle of a commit.
As this will halt the commit phase for potentially a long time (relative) if dns is not up'n'running.
This in itself is not that critical, but if this is done the same on multiple sub-systems you potentially can have an exponentionall increase of boot time because of this.
And in a time where we are optimising milliseconds of code to get shorter boot and commit times in other subsystems i feel this is not the correct way to do it.

Mon, Nov 25, 5:38 PM · VyOS Rolling

Tue, Nov 19

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

5 endpoints using domain, limit retry to 5 times, total start costs around 5 * 10 = 50 seconds.

Tue, Nov 19, 3:25 PM · VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.
In T4930#208083, @runar wrote:

Hi @sskaje!

In reference to T1700 and other tickets, there are things in wireguard that is not implemented the "best way".
For the first as noted earlier, the Wireguard kernel module have NO information of the existance of a "DNS peer", DNS to IP mappings are done by the wg config utillity at the moment the command is executed on the device.. this means that entering a DNS name as a peer address will execute a DNS request ONCE and its never retried .

Tue, Nov 19, 10:41 AM · VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

I thought dns look up causes the block. So I made some changes like:

Tue, Nov 19, 8:00 AM · VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

@Viacheslav I made is based on T6490, PR here: https://github.com/vyos/vyos-1x/pull/4194
This PR makes peers no longer required, so WireGuard interfaces will be created on boot, with or without Internet connection, with or without DNS resolution.

Tue, Nov 19, 2:56 AM · VyOS Rolling

Mon, Nov 18

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

Code commit here: https://github.com/sskaje/vyos-1x/tree/T4930

Mon, Nov 18, 5:06 PM · VyOS Rolling

Fri, Nov 15

sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

I simply added hostname/fqdn to address and here is my test result:

Fri, Nov 15, 3:32 PM · VyOS Rolling
sskaje added a comment to T4930: Allow WireGuard peers via DNS hostname.

I'm migrating my EdgeRouter to VyOS, its module 'https://github.com/WireGuard/wireguard-vyatta-ubnt/releases' supports endpoint as domain:port, which is same as wg set or wg-quick.

Fri, Nov 15, 12:03 PM · VyOS Rolling
sskaje added a comment to T6490: Allow creation of wireguard interfaces without requiring peers.

I created a PR https://github.com/vyos/vyos-1x/pull/4194

Fri, Nov 15, 11:33 AM · VyOS Rolling

Apr 10 2023

sskaje added a comment to T5122: Move "archive-areas" to defaults.toml to support "non-free-firmware" repository.

My fault, the double quotes were mis-removed in the PR when cleaning code.

Apr 10 2023, 2:07 PM · VyOS 1.4 Sagitta (1.4.0-epa1)

Mar 29 2023

sskaje added a comment to T5121: Incorrect "architecture" config loaded.

I've made some changes but not sure if the logic is what VyOS team accept.

Mar 29 2023, 11:15 AM · VyOS 1.4 Sagitta (1.4.0-epa2)
sskaje added a comment to T5120: Override all debian mirror server name in url.

Code changed, to override all settings in build_config instead of args from cli only.

Mar 29 2023, 9:02 AM
sskaje created T5122: Move "archive-areas" to defaults.toml to support "non-free-firmware" repository.
Mar 29 2023, 8:44 AM · VyOS 1.4 Sagitta (1.4.0-epa1)
sskaje changed Version from - to 1.4- on T5121: Incorrect "architecture" config loaded.
Mar 29 2023, 8:38 AM · VyOS 1.4 Sagitta (1.4.0-epa2)
sskaje created T5121: Incorrect "architecture" config loaded.
Mar 29 2023, 8:38 AM · VyOS 1.4 Sagitta (1.4.0-epa2)
sskaje changed Issue type from unspecified to improvement on T5120: Override all debian mirror server name in url.
Mar 29 2023, 7:56 AM
sskaje created T5120: Override all debian mirror server name in url.
Mar 29 2023, 7:43 AM